Sciweavers

7274 search results - page 1305 / 1455
» Abstractions for network update
Sort
View
NSPW
2006
ACM
15 years 10 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
BROADNETS
2005
IEEE
15 years 9 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
15 years 9 months ago
Cournot Equilibrium in Price-Capped Two-Settlement Electricity Markets
Abstract— We compare two alternative mechanisms for capping prices in two-settlement electricity markets. With sufficient lead time and competitive entry opportunities, forward ...
Jian Yao, Bert Willems, Shmuel S. Oren, Ilan Adler
ICCV
2005
IEEE
15 years 9 months ago
Behaviour Understanding in Video: A Combined Method
In this paper we develop a system for human behaviour recognition in video sequences. Human behaviour is modelled as a stochastic sequence of actions. Actions are described by a f...
Neil Robertson, Ian D. Reid
136
Voted
ICRA
2005
IEEE
186views Robotics» more  ICRA 2005»
15 years 9 months ago
CPG-Based Manipulation: Adaptive Switchings of Grasping Fingers by Joint Angle Feedback
Abstract— Human can efficiently grasp and dextrously manipulate various objects using their fingers cooperatively. When they attain proficiency in the rotating manipulation of...
Yuichi Kurita, Kazuyuki Nagata, Jun Ueda, Yoshio M...
« Prev « First page 1305 / 1455 Last » Next »