Sciweavers

353 search results - page 49 / 71
» The C Hackers Guide
Sort
View
ISI
2008
Springer
13 years 9 months ago
A framework for privacy-preserving cluster analysis
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...
NN
2007
Springer
13 years 9 months ago
A neural model of decision-making by the superior colicullus in an antisaccade task
In the antisaccade paradigm subjects are instructed to perform eye movements in the opposite direction from the location of a visually appearing stimulus while they are fixating ...
Vassilis Cutsuridis, Nikolaos Smyrnis, Ioannis Evd...
TPDS
2010
103views more  TPDS 2010»
13 years 8 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
IJRR
2011
174views more  IJRR 2011»
13 years 4 months ago
Bounding on rough terrain with the LittleDog robot
— In this paper we develop an RRT-based motion planner that achieved bounding in simulation with the LittleDog robot over extremely rough terrain. LittleDog is a quadruped robot ...
Alexander C. Shkolnik, Michael Levashov, Ian R. Ma...
TVCG
2011
182views more  TVCG 2011»
13 years 4 months ago
Directing Crowd Simulations Using Navigation Fields
—We present a novel approach to direct and control virtual crowds using navigation fields. Our method guides one or more agents towards desired goals based on guidance fields. ...
Sachin Patil, Jur P. van den Berg, Sean Curtis, Mi...