Sciweavers

1356 search results - page 226 / 272
» Some New Results on Inverse Sorting Problems
Sort
View
AUGHUMAN
2011
13 years 3 months ago
"Vection field" for pedestrian traffic control
: Today in general traffic field, visual signs and audio cues are used for pedestrian control. As the pedestrians need to acquire and recognize them, time delay between cognition a...
Masahiro Furukawa, Hiromi Yoshikawa, Taku Hachisu,...
TDSC
2011
13 years 3 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
PROCEDIA
2010
129views more  PROCEDIA 2010»
13 years 3 months ago
Car-driving assistance using organization measurement of reactive multi-agent system
This work presents an approach to the obstacle avoidance problem, applicable in the frame of driver assistance. A decision, expressed as a proposed acceleration vector for the veh...
Franck Gechter, Jean-Michel Contet, Pablo Gruer, A...
TIM
2010
144views Education» more  TIM 2010»
13 years 3 months ago
Extending Polynomial Chaos to Include Interval Analysis
Polynomial chaos theory (PCT) has been proven to be an efficient and effective way to represent and propagate uncertainty through system models and algorithms in general. In partic...
Antonello Monti, Ferdinanda Ponci, Marco Valtorta
TSE
2010
230views more  TSE 2010»
13 years 3 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...