Sciweavers

8881 search results - page 1581 / 1777
» Active Data Clustering
Sort
View
139
Voted
IMC
2003
ACM
15 years 9 months ago
In search of path diversity in ISP networks
Internet Service Providers (ISPs) can exploit path diversity to balance load and improve robustness. Unfortunately, it is difficult to evaluate the potential impact of these appr...
Renata Teixeira, Keith Marzullo, Stefan Savage, Ge...
123
Voted
PODS
2010
ACM
184views Database» more  PODS 2010»
15 years 9 months ago
Universally optimal privacy mechanisms for minimax agents
A scheme that publishes aggregate information about sensitive data must resolve the trade-off between utility to information consumers and privacy of the database participants. D...
Mangesh Gupte, Mukund Sundararajan
COMPSAC
2002
IEEE
15 years 9 months ago
A Case Study of Dependable Software Upgrade with Distributed Components
Technology presented in the paper [1] allows validation of software architecture before component upgrades. This paper presents a case study of applying this method to the upgrade ...
J. Jenny Li, Xueshan Shan
HAPTICS
2002
IEEE
15 years 9 months ago
Building a Task Language for Segmentation and Recognition of User Input to Cooperative Manipulation Systems
We present the results of using Hidden Markov Models (HMMs) for automatic segmentation and recognition of user motions. Previous work on recognition of user intent with man/machin...
C. Sean Hundtofte, Gregory D. Hager, Allison M. Ok...
135
Voted
HICSS
2002
IEEE
159views Biometrics» more  HICSS 2002»
15 years 9 months ago
Coordination of Inter-organisational Healthcare Processes via Specialisation of Internet-Based Object Life Cycles
We describe an approach to healthcare coordination using object life cycles (OLCs) [1]. By consulting the OLC of a given patient object instance, the legal methods to apply to tha...
Sistine Barretto, James R. Warren, Markus Stumptne...
« Prev « First page 1581 / 1777 Last » Next »