Sciweavers

950 search results - page 170 / 190
» Constraint Based Resilience Analysis
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
IPM
2007
105views more  IPM 2007»
13 years 7 months ago
Schema and constraints-based matching and merging of Topic Maps
In this paper, we propose a multi-strategic matching and merging approach to find correspondences between ontologies based on the syntactic or semantic characteristics and constr...
Jung-Min Kim, Hyopil Shin, Hyoung-Joo Kim
PAMI
2002
150views more  PAMI 2002»
13 years 7 months ago
Object Tracking with Bayesian Estimation of Dynamic Layer Representations
Decomposing video frames into coherent two-dimensional motion layers is a powerful method for representing videos. Such a representation provides an intermediate description that e...
Hai Tao, Harpreet S. Sawhney, Rakesh Kumar
TROB
2002
138views more  TROB 2002»
13 years 7 months ago
Interference-free polyhedral configurations for stacking
This paper uses a configuration space ( -space) based method to compute interference-free configuration for stacking polyhedral sheet metal parts. This work forms the interference ...
Venkateswara R. Ayyadevara, David A. Bourne, Kenji...
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 6 months ago
Mechanism Design via Correlation Gap
For revenue and welfare maximization in singledimensional Bayesian settings, Chawla et al. (STOC10) recently showed that sequential posted-price mechanisms (SPMs), though simple i...
Qiqi Yan