Sciweavers

1207 search results - page 207 / 242
» Towards optimal k-anonymization
Sort
View
JMM2
2007
123views more  JMM2 2007»
13 years 8 months ago
An Assignment Scheme to Control Multiple Pan/Tilt Cameras for 3D Video
— This paper presents an assignment scheme to control multiple Pan/Tilt (PT) cameras for 3D video of a moving object. The system combines static wide field of view (FOV) cameras...
Sofiane Yous, Norimichi Ukita, Masatsugu Kidode
TVLSI
2008
119views more  TVLSI 2008»
13 years 8 months ago
Automatic Design of Reconfigurable Domain-Specific Flexible Cores
Reconfigurable hardware is ideal for use in Systems-on-a-Chip, as it provides both hardware-level performance and post-fabrication flexibility. However, any one architecture is ra...
Katherine Compton, Scott Hauck
HEURISTICS
2002
152views more  HEURISTICS 2002»
13 years 8 months ago
A Constraint-Based Method for Project Scheduling with Time Windows
This paper presents a heuristic algorithm for solving RCPSP/max, the resource constrained project scheduling problem with generalized precedence relations. The algorithm relies, a...
Amedeo Cesta, Angelo Oddi, Stephen F. Smith
SIAMCO
2000
110views more  SIAMCO 2000»
13 years 8 months ago
On the Minimizing Property of a Second Order Dissipative System in Hilbert Spaces
We study the asymptotic behavior at infinity of solutions of a second order evolution equation with linear damping and convex potential. The differential system is defined in a rea...
Felipe Alvarez
SIGMETRICS
2000
ACM
125views Hardware» more  SIGMETRICS 2000»
13 years 8 months ago
Resource management policies for e-commerce servers
Quality of service of e-commerce sites has been usually managed by the allocation of resources such as processors, disks, and network bandwidth, and by tracking conventional perfo...
Daniel A. Menascé, Rodrigo C. Fonseca, Virg...