Sciweavers

203 search results - page 28 / 41
» Second-Order Risk Constraints
Sort
View
CACM
2004
87views more  CACM 2004»
13 years 7 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
MOBISYS
2003
ACM
14 years 7 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
CDC
2009
IEEE
101views Control Systems» more  CDC 2009»
14 years 4 days ago
Barrier function nonlinear optimization for optimal Decompression of divers
— This paper is based on a comprehensive dynamic mathematical model (Copernicus) of vascular bubble formation and growth during and after decompression from a dive. The model des...
Le Feng, Christian R. Gutvik, Tor Arne Johansen, D...
ICECCS
1999
IEEE
83views Hardware» more  ICECCS 1999»
13 years 11 months ago
A Framework for Analyzing Configurations of Deployable Software Systems
Configuring and deploying a large software system is complicated when the system is composed of components and when there are numerous possible configurations for the system. In s...
Dennis Heimbigner, Richard S. Hall, Alexander L. W...
CSCWD
2005
Springer
13 years 9 months ago
BW-M: a framework for awareness support in Web-based groupware systems
In this paper, we present a framework for contextbased awareness support designed for web-based groupware systems. Nowadays, such systems can be accessed through web-enabled mobil...
Manuele Kirsch-Pinheiro, Marlène Villanova-...