Sciweavers

331 search results - page 50 / 67
» Vicinal Risk Minimization
Sort
View
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
14 years 1 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
ISAS
2007
Springer
14 years 1 months ago
MDDPro: Model-Driven Dependability Provisioning in Enterprise Distributed Real-Time and Embedded Systems
Service oriented architecture (SOA) design principles are increasingly being adopted to develop distributed real-time and embedded (DRE) systems, such as avionics mission computin...
Sumant Tambe, Jaiganesh Balasubramanian, Aniruddha...
UCS
2007
Springer
14 years 1 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
FDL
2006
IEEE
14 years 1 months ago
Functional Virtual Prototyping Design Flow and VHDL-AMS
Needs in the worldwide competition push teams to master more and more their design flow in order to minimize risks, costs, time to market, and potential liabilities. The classical...
Yannick Hervé, Patricia Desgreys
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
14 years 1 months ago
People Identification with Limited Labels in Privacy-Protected Video
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
Yi Chang, Rong Yan, Datong Chen, Jie Yang