Sciweavers

2099 search results - page 207 / 420
» Distributed constraint optimization with structured resource...
Sort
View
DAWAK
2006
Springer
14 years 2 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
CVPR
2011
IEEE
13 years 7 months ago
Energy Based Multiple Model Fitting for Non-Rigid Structure from Motion
In this paper we reformulate the 3D reconstruction of deformable surfaces from monocular video sequences as a labeling problem. We solve simultaneously for the assignment of featu...
Chris Russell, Joao Fayad, Lourdes Agapito
DAC
2001
ACM
14 years 11 months ago
Battery-Aware Static Scheduling for Distributed Real-Time Embedded Systems
This paper addresses battery-aware static scheduling in batterypowered distributed real-time embedded systems. As suggested by previous work, reducing the discharge current level ...
Jiong Luo, Niraj K. Jha
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
14 years 5 months ago
Distributed subgradient methods and quantization effects
Abstract— We consider a convex unconstrained optimization problem that arises in a network of agents whose goal is to cooperatively optimize the sum of the individual agent objec...
Angelia Nedic, Alexander Olshevsky, Asuman E. Ozda...
ISORC
2007
IEEE
14 years 5 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon