Sciweavers

203 search results - page 25 / 41
» Second-Order Risk Constraints
Sort
View
SECRYPT
2010
129views Business» more  SECRYPT 2010»
14 years 7 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
CHI
2005
ACM
15 years 10 months ago
Chit chat club: bridging virtual and physical space for social interaction
In this work, we create an audio-video link via an interactive sculpture to facilitate casual, sociable communication between two remote spaces. This communication installation wa...
Karrie Karahalios, Kelly Dobson
IJCAI
2007
14 years 11 months ago
Online Speed Adaptation Using Supervised Learning for High-Speed, Off-Road Autonomous Driving
The mobile robotics community has traditionally addressed motion planning and navigation in terms of steering decisions. However, selecting the best speed is also important – be...
David Stavens, Gabriel Hoffmann, Sebastian Thrun
SNPD
2008
14 years 11 months ago
Customer Value-based HW/SW Partitioning Decision in Embedded Systems
In launching a product, requirement change is always risk to an embedded system designer. Including requirements change, limited resources (e.g. development time and cost) are als...
Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, H...
EMMCVPR
2011
Springer
13 years 9 months ago
Curvature Regularization for Curves and Surfaces in a Global Optimization Framework
Length and area regularization are commonplace for inverse problems today. It has however turned out to be much more difficult to incorporate a curvature prior. In this paper we pr...
Petter Strandmark, Fredrik Kahl