Sciweavers

10797 search results - page 1983 / 2160
» Robust control applications
Sort
View
JSAC
2008
98views more  JSAC 2008»
15 years 4 months ago
Randomized consensus algorithms over large scale networks
Suppose we have a directed graph G with set of nodes V = {1, . . . , N} and a measure xi for every node i V . The average consensus problem consists in computing the average xA = ...
Fabio Fagnani, Sandro Zampieri
JSW
2008
240views more  JSW 2008»
15 years 4 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
JSW
2008
101views more  JSW 2008»
15 years 4 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
JWSR
2008
147views more  JWSR 2008»
15 years 4 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
JFR
2006
141views more  JFR 2006»
15 years 4 months ago
A method for protocol-based collision avoidance between autonomous marine surface craft
This paper is concerned with the in-field autonomous operation of unmanned marine vehicles in accordance with convention for safe and proper collision avoidance as prescribed by t...
Michael R. Benjamin, John J. Leonard, Joseph A. Cu...
« Prev « First page 1983 / 2160 Last » Next »