Sciweavers

1207 search results - page 188 / 242
» Towards optimal k-anonymization
Sort
View
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
14 years 2 months ago
Flocking with Obstacle Avoidance: A New Distributed Coordination Algorithm Based on Voronoi Partitions
— A new distributed coordination algorithm for multi-vehicle systems is presented in this paper. The algorithm combines a particular choice of navigation function with Voronoi pa...
Magnus Lindhé, Petter Ögren, Karl Henr...
IEEESCC
2005
IEEE
14 years 2 months ago
Online and Minimum-Cost Ad Hoc Delegation in e-Service Composition
The paradigm of automated e-service composition through the integration of existing services promises a fast and efficient development of new services in cooperative business env...
Cagdas Evren Gerede, Oscar H. Ibarra, Bala Ravikum...
INFOCOM
2005
IEEE
14 years 2 months ago
Interference-aware routing in multihop wireless networks using directional antennas
— Recent research has shown that interference can make a significant impact on the performance of multihop wireless networks. Researchers have studied interference-aware topolog...
Jian Tang, Guoliang Xue, Christopher Chandler, Wei...
ASPDAC
2005
ACM
127views Hardware» more  ASPDAC 2005»
14 years 2 months ago
Clock network minimization methodology based on incremental placement
: In ultra-deep submicron VLSI circuits, clock network is a major source of power consumption and power supply noise. Therefore, it is very important to minimize clock network size...
Liang Huang, Yici Cai, Qiang Zhou, Xianlong Hong, ...
ADAEUROPE
2005
Springer
14 years 2 months ago
The Application of Compile-Time Reflection to Software Fault Tolerance Using Ada 95
Transparent system support for software fault tolerance reduces performance in general and precludes application-specific optimizations in particular. In contrast, explicit support...
Patrick Rogers, Andy J. Wellings