Sciweavers

5687 search results - page 1132 / 1138
» Visualizing Evaluation in Scheme
Sort
View
USS
2010
13 years 5 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
IEEECSA
2009
13 years 5 months ago
Multiratecast in Wireless Fault Tolerant Sensor and Actuator Networks
We study the multicast problem in wireless sensor networks, where the source can send data to a fixed number of destinations (actuators) at a different rate (multiratecast). A typi...
Xuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya...
WISEC
2010
ACM
14 years 17 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
CVPR
2011
IEEE
13 years 3 months ago
RUNE-Tag: a High Accuracy Fiducial Marker with Strong Occlusion Resilience
Over the last decades fiducial markers have provided widely adopted tools to add reliable model-based features into an otherwise general scene. Given their central role in many c...
Filippo Bergamasco, Andrea Albarelli, Andrea Torse...
TKDE
2011
150views more  TKDE 2011»
13 years 2 months ago
Estimating and Enhancing Real-Time Data Service Delays: Control-Theoretic Approaches
—It is essential to process real-time data service requests such as stock quotes and trade transactions in a timely manner using fresh data, which represent the current real worl...
Kyoung-Don Kang, Yan Zhou, Jisu Oh
« Prev « First page 1132 / 1138 Last » Next »