Sciweavers

2016 search results - page 382 / 404
» Some observations on HC-128
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
CDC
2008
IEEE
111views Control Systems» more  CDC 2008»
15 years 4 months ago
A separation principle for linear switching systems and parametrization of all stabilizing controllers
In this paper, we investigate the problem of designing a switching compensator for a plant switching amongst a (finite) family of given configurations (Ai,Bi,Ci). We assume that...
Franco Blanchini, Stefano Miani, Fouad Mesquine
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
15 years 3 months ago
Two-phase schema matching in real world relational databases
— We propose a new approach to the problem of schema matching in relational databases that merges the hybrid and composite approach of combining multiple individual matching tech...
Nikolaos Bozovic, Vasilis Vassalos
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
15 years 3 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
IJCNN
2008
IEEE
15 years 3 months ago
Two-level clustering approach to training data instance selection: A case study for the steel industry
— Nowadays, huge amounts of information from different industrial processes are stored into databases and companies can improve their production efficiency by mining some new kn...
Heli Koskimäki, Ilmari Juutilainen, Perttu La...