Sciweavers

5622 search results - page 1016 / 1125
» Solving architectural modelling problems using knowledge
Sort
View
169
Voted
LOCA
2009
Springer
15 years 10 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
121
Voted
ICRA
2008
IEEE
128views Robotics» more  ICRA 2008»
15 years 10 months ago
A point-based POMDP planner for target tracking
— Target tracking has two variants that are often studied independently with different approaches: target searching requires a robot to find a target initially not visible, and ...
David Hsu, Wee Sun Lee, Nan Rong
125
Voted
TOOLS
2008
IEEE
15 years 10 months ago
Component Reassembling and State Transfer in MaDcAr-Based Self-adaptive Software
In this paper, we introduce MaDcAr, a model of engines for dynamic and automatic (re)assembling of component-based software. In MaDcAr, an application description consists of the d...
Guillaume Grondin, Noury Bouraqadi, Laurent Vercou...
132
Voted
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 9 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang
99
Voted
CONCUR
2007
Springer
15 years 9 months ago
Making Random Choices Invisible to the Scheduler
Abstract. When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to res...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
« Prev « First page 1016 / 1125 Last » Next »