Sciweavers

1207 search results - page 200 / 242
» Towards optimal k-anonymization
Sort
View
CF
2005
ACM
13 years 10 months ago
On the energy-efficiency of speculative hardware
Microprocessor trends are moving towards wider architectures and more aggressive speculation. With the increasing transistor budgets, energy consumption has become a critical desi...
Nana B. Sam, Martin Burtscher
DAS
2008
Springer
13 years 10 months ago
Handling of Surface Modifications for Robust Image Based Mail Piece Comparison
Image based mail piece identification is a new technology for optimizing the postal sorting process. Exploiting the mail piece surface uniqueness, characteristic features are used...
Katja Worm, Beate Meffert
NETWORKING
2007
13 years 10 months ago
On-Demand Routing in Disrupted Environments
While current on-demand routing protocols are optimized to take into account unique features of mobile ad hoc networks (MANETs) such as frequent topology changes and limited batter...
Jay Boice, J. J. Garcia-Luna-Aceves, Katia Obraczk...
NIPS
2007
13 years 10 months ago
Theoretical Analysis of Heuristic Search Methods for Online POMDPs
Planning in partially observable environments remains a challenging problem, despite significant recent advances in offline approximation techniques. A few online methods have a...
Stéphane Ross, Joelle Pineau, Brahim Chaib-...
AAAI
2004
13 years 10 months ago
A Comparison of Techniques for Scheduling Earth Observing Satellites
Scheduling observations by coordinated fleets of Earth Observing Satellites (EOS) involves large search spaces, complex constraints and poorly understood bottlenecks; conditions w...
Al Globus, James Crawford, Jason D. Lohn, Anna Pry...