Sciweavers

2620 search results - page 464 / 524
» Efficient Hardware Voxelization
Sort
View
CSSE
2006
IEEE
15 years 4 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
IVC
2006
161views more  IVC 2006»
15 years 4 months ago
Applications of moving windows technique to autonomous vehicle navigation
A `Moving Window' scheme for detecting lanes, obstacles and corridor environments from the images captured by a CCD camera in an automobile or mobile robot is proposed. Proce...
Sung Yug Choi, Jang Myung Lee
JMLR
2006
80views more  JMLR 2006»
15 years 4 months ago
Using Machine Learning to Guide Architecture Simulation
An essential step in designing a new computer architecture is the careful examination of different design options. It is critical that computer architects have efficient means by ...
Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Cald...
JSAC
2006
183views more  JSAC 2006»
15 years 4 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran
173
Voted
IJWET
2007
152views more  IJWET 2007»
15 years 4 months ago
Semantic web technologies for ubiquitous computing resource management in smart spaces
: Context-aware ubiquitous computing environments tend to be highly distributed and heterogeneous, while also featuring increased dynamism as elements, devices and middleware compo...
John Soldatos, Kostas Stamatis, Siamak Azodolmolky...