Sciweavers

344 search results - page 18 / 69
» The Well Mannered Wearable Computer
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
ACHI
2010
IEEE
14 years 2 months ago
A Simulation Framework for Human-Robot Interaction
Abstract—The development of human-robot interaction scenarios is a strongly situation-dependent as well as an extremely dynamic task. Humans interacting with the robot directly r...
Norbert Schmitz, Jochen Hirth, Karsten Berns
CVPR
2003
IEEE
14 years 9 months ago
Kullback-Leibler Boosting
In this paper, we develop a general classification framework called Kullback-Leibler Boosting, or KLBoosting. KLBoosting has following properties. First, classification is based o...
Ce Liu, Heung-Yeung Shum
WIOPT
2011
IEEE
12 years 11 months ago
Open loop optimal control of base station activation for green networks
Abstract—In recent years there has been an increasing awareness that the deployment as well as utilization of new information technology may have some negative ecological impact....
Sreenath Ramanath, Veeraruna Kavitha, Eitan Altman
AINA
2011
IEEE
12 years 11 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor