Sciweavers

6149 search results - page 1187 / 1230
» Revealing the programming process
Sort
View
130
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 5 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
117
Voted
COOPIS
2002
IEEE
15 years 5 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
90
Voted
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 5 months ago
A New Buffer Management Scheme for Multimedia Terminals in Broadband Satellite Networks
In the recent years, there has been a growing interest in broadband satellite networks. Broadband satellite networks are designed to provide the required qualify of service (QoS) ...
Mahnoosh Mobasseri, Victor C. M. Leung
143
Voted
ICARCV
2002
IEEE
149views Robotics» more  ICARCV 2002»
15 years 5 months ago
A fast method to simulate virtual deformable objects with force feedback
In this paper, we propose solutions to real time simulation and interaction of deformable objects in virtual reality. Firstly, we present LEM - Long Element Method, a method creat...
Kenneth Sundaraj, César Mendoza, Christian ...
ICPP
2002
IEEE
15 years 5 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
« Prev « First page 1187 / 1230 Last » Next »