Sciweavers

1156 search results - page 221 / 232
» The PENG System: Practice and Experience
Sort
View
ATAL
2009
Springer
15 years 5 months ago
Distributed constraint optimization with structured resource constraints
Distributed constraint optimization (DCOP) provides a framework for coordinated decision making by a team of agents. Often, during the decision making, capacity constraints on age...
Akshat Kumar, Boi Faltings, Adrian Petcu
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 5 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
ICDCS
2007
IEEE
15 years 5 months ago
Magellan: Charting Large-Scale Peer-to-Peer Live Streaming Topologies
Live peer-to-peer (P2P) streaming applications have been successfully deployed in the Internet. With relatively simple peer selection protocol design, modern live P2P streaming ap...
Chuan Wu, Baochun Li, Shuqiao Zhao
IROS
2007
IEEE
210views Robotics» more  IROS 2007»
15 years 5 months ago
Extrinsic self calibration of a camera and a 3D laser range finder from natural scenes
— In this paper, we describe a new approach for the extrinsic calibration of a camera with a 3D laser range finder, that can be done on the fly. This approach does not require an...
Davide Scaramuzza, Ahad Harati, Roland Siegwart
NDSS
2007
IEEE
15 years 5 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton