Sciweavers

988 search results - page 11 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICC
2007
IEEE
290views Communications» more  ICC 2007»
14 years 3 months ago
Mobile Position Tracking by TDOA-Doppler Hybrid Estimation in Mobile Cellular System
Abstract— An effective method is presented for position tracking of a moving mobile terminal (MT). The method is based on time/distance difference of arrival (TDOA) estimation an...
Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiaohu...
VAMOS
2007
Springer
14 years 2 months ago
On the Structure of Problem Variability: From Feature Diagrams to Problem Frames
Requirements for product families are expressed in terms of commonality and variability. This distinction allows early identification of an appropriate software architecture and ...
Andreas Classen, Patrick Heymans, Robin C. Laney, ...
FOSSACS
2008
Springer
13 years 10 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
ECML
2005
Springer
14 years 2 months ago
Learning from Positive and Unlabeled Examples with Different Data Distributions
Abstract. We study the problem of learning from positive and unlabeled examples. Although several techniques exist for dealing with this problem, they all assume that positive exam...
Xiaoli Li, Bing Liu
VR
2009
IEEE
130views Virtual Reality» more  VR 2009»
14 years 3 months ago
Spatialized Haptic Rendering: Providing Impact Position Information in 6DOF Haptic Simulations Using Vibrations
In this paper we introduce a “Spatialized Haptic Rendering” technique to enhance 6DOF haptic manipulation of virtual objects with impact position information using vibrations....
Jean Sreng, Anatole Lécuyer, Claude Andriot...