Sciweavers

1207 search results - page 193 / 242
» Towards optimal k-anonymization
Sort
View
WS
2003
ACM
14 years 1 months ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...
EMMCVPR
2003
Springer
14 years 1 months ago
Curvature Vector Flow to Assure Convergent Deformable Models for Shape Modelling
Poor convergence to concave shapes is a main limitation of snakes as a standard segmentation and shape modelling technique. The gradient of the external energy of the snake represe...
Debora Gil, Petia Radeva
GECCO
2003
Springer
108views Optimization» more  GECCO 2003»
14 years 1 months ago
Sexual Selection of Co-operation
Advocates of sexual selection theory have argued that various male traits, such as male co-operative behavior towards females, can evolve through female preference for mating with ...
Muhammad Afzal Upal
IICS
2003
Springer
14 years 1 months ago
Improving Web Server Performance by Distributing Web Applications
Distributed interNet Application (DNA) covers a wide range of topics. DNA is a methodology that specifies how to distribute Internet application on various Web servers. DNA helps t...
Mital Kakaiya, Sushant Goel, Hema Sharda, David Ta...
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
14 years 1 months ago
Taming the component timing: A CBD methodology for real-time embedded systems
—The growing trend towards using component based design approach in embedded system development requires addressing newer system engineering challenges. These systems are usually...
Manoj G. Dixit, Pallab Dasgupta, S. Ramesh