Sciweavers

1827 search results - page 117 / 366
» Driver Measurement: Methods and Applications
Sort
View
CVPR
2000
IEEE
15 years 5 days ago
Reconstruction from Six-Point Sequences
An algorithm is given for computing projective structure from a set of six points seen in a sequence of many images. The method is based on the notion of duality between cameras a...
Richard I. Hartley, Nicolas Y. Dano
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 10 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
EUSAI
2003
Springer
14 years 3 months ago
Ultrasonic 3D Position Estimation Using a Single Base Station
Abstract. In indoor context awareness applications the location of people, devices or objects is often required. Ultrasound technology enables high resolution indoor position measu...
Esko O. Dijk, Kees van Berkel, Ronald M. Aarts, Ev...
FORMATS
2010
Springer
13 years 8 months ago
Robust Satisfaction of Temporal Logic over Real-Valued Signals
Abstract. We consider temporal logic formulae specifying constraints in continuous time and space on the behaviors of continuous and hybrid dynamical system admitting uncertain par...
Alexandre Donzé, Oded Maler
ISI
2005
Springer
14 years 3 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang