Sciweavers

5758 search results - page 1042 / 1152
» Anonymity-preserving data collection
Sort
View
KI
2007
Springer
14 years 4 months ago
Bridging the Sense-Reasoning Gap Using DyKnow: A Knowledge Processing Middleware Framework
To achieve complex missions an autonomous unmanned aerial vehicle (UAV) operating in dynamic environments must have and maintain situational awareness. This can be achieved by cont...
Fredrik Heintz, Piotr Rudol, Patrick Doherty
LCPC
2007
Springer
14 years 4 months ago
Supporting Huge Address Spaces in a Virtual Machine for Java on a Cluster
Abstract. To solve problems that require far more memory than a single machine can supply, data can be swapped to disk in some manner, it can be compressed, and/or the memory of mu...
Ronald Veldema, Michael Philippsen
LOCA
2007
Springer
14 years 4 months ago
Localizing Tags Using Mobile Infrastructure
This paper presents algorithms, simulations, and empirical results of a system that finds relative tag positions in 3D space using a new approach called “mobile infrastructure....
Ying Zhang, Kurt Partridge, Jim Reich
PAM
2007
Springer
14 years 4 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
PROFES
2007
Springer
14 years 4 months ago
An Industrial Survey of Software Outsourcing in China
Most studies of software outsourcing focus on how to manage the outsourcing from the perspective of the outsourcer, i.e., a company issuing a subcontract. There are few studies of ...
Jianqiang Ma, Jingyue Li, Weibing Chen, Reidar Con...
« Prev « First page 1042 / 1152 Last » Next »