Sciweavers

1554 search results - page 285 / 311
» A New Simulation Tool for the Modeling and Control of Distri...
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 2 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 6 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
SMA
2008
ACM
139views Solid Modeling» more  SMA 2008»
13 years 7 months ago
An incremental approach to feature aligned quad dominant remeshing
In this paper we present a new algorithm which turns an unstructured triangle mesh into a quad-dominant mesh with edges aligned to the principal directions of the underlying geome...
Yu-Kun Lai, Leif Kobbelt, Shi-Min Hu
AIIDE
2008
13 years 10 months ago
Automatic Generation of Game Level Solutions as Storyboards
Interactive Storytelling techniques are attracting much interest for their potential to develop new game genres but also as another form of procedural content generation, specific...
David Pizzi, Marc Cavazza, Alex Whittaker, Jean-Lu...
MOBIHOC
2005
ACM
14 years 7 months ago
Inducing spatial clustering in MAC contention for spread spectrum ad hoc networks
This paper proposes a new principle for designing MAC protocols for spread spectrum based ad hoc networks ? inducing spatial clustering in contending transmitters/receivers. We fi...
Xiangying Yang, Gustavo de Veciana