Sciweavers

1580 search results - page 36 / 316
» Non-Interference Through Determinism
Sort
View
IEICET
2006
83views more  IEICET 2006»
13 years 8 months ago
Visualization Methods for Outdoor See-Through Vision
Visualizing occluded objects is a useful applications of Mixed Reality (MR), which we call "see-through vision." For this application, it is important to display occlude...
Takahiro Tsuda, Haruyoshi Yamamoto, Yoshinari Kame...
CORR
2007
Springer
128views Education» more  CORR 2007»
13 years 8 months ago
Model Selection Through Sparse Maximum Likelihood Estimation
We consider the problem of estimating the parameters of a Gaussian or binary distribution in such a way that the resulting undirected graphical model is sparse. Our approach is to...
Onureena Banerjee, Laurent El Ghaoui, Alexandre d'...
KES
2006
Springer
13 years 8 months ago
Solving power and trust conflicts through argumentation in agent-mediated knowledge distribution
Distributing pieces of knowledge in large, usually distributed organizations is a central problem in Knowledge and Organization management. Policies for distributing knowledge and...
Carlos Iván Chesñevar, Ramón ...
TPDS
2008
231views more  TPDS 2008»
13 years 8 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
ICIP
2010
IEEE
13 years 6 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...