Sciweavers

203 search results - page 25 / 41
» Second-Order Risk Constraints
Sort
View
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 5 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
CHI
2005
ACM
14 years 7 months ago
Chit chat club: bridging virtual and physical space for social interaction
In this work, we create an audio-video link via an interactive sculpture to facilitate casual, sociable communication between two remote spaces. This communication installation wa...
Karrie Karahalios, Kelly Dobson
IJCAI
2007
13 years 8 months ago
Online Speed Adaptation Using Supervised Learning for High-Speed, Off-Road Autonomous Driving
The mobile robotics community has traditionally addressed motion planning and navigation in terms of steering decisions. However, selecting the best speed is also important – be...
David Stavens, Gabriel Hoffmann, Sebastian Thrun
SNPD
2008
13 years 8 months ago
Customer Value-based HW/SW Partitioning Decision in Embedded Systems
In launching a product, requirement change is always risk to an embedded system designer. Including requirements change, limited resources (e.g. development time and cost) are als...
Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, H...
EMMCVPR
2011
Springer
12 years 7 months ago
Curvature Regularization for Curves and Surfaces in a Global Optimization Framework
Length and area regularization are commonplace for inverse problems today. It has however turned out to be much more difficult to incorporate a curvature prior. In this paper we pr...
Petter Strandmark, Fredrik Kahl