Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Cloaking Search'
Cloaking Search published presentations and documents on DocSlides.
Cloaking and Modeling Techniques for location Privacy prote
by giovanna-bartolotta
Ying Cai. Department of Computer Science. Iowa St...
Invisibility Cloak
by cheryl-pisano
By . H. arsha. Origins. In folklore, mythology ...
Location Privacy Protection for Location-based Services
by olivia-moreira
CS587x Lecture. Department of Computer Science. I...
Cloak and Da er Dynamics of eb Sear Cloaking Da vid ang Stef an Sa age and Geoffre M
by briana-ranney
oelk er Deptar tment of Computer Science and Engi...
Cloaking a sensor for threedimensional Maxwell s equat
by yoshiko-marsland
edusg Abstract The ideal transformation optics clo...
Spatial Cloaking Algorithms for Lo cation Priv acy Chi
by stefany-barnette
The most widely used priv acy requiremen ts are a...
Simple broadband optical spatial cloaking of very larg
by tatiana-dople
Howell and J Benjamin Howell Department of Physic...
Cloaking and Redirection Preliminary Study Baoning and
by sherrill-nordquist
Da vison Computer Science Engineering Lehigh Univ...
Cloaking via Change of Variables in Electric Impedance
by pamella-moone
V Kohn HShen MS Vogelius and MI Weinstein Revise...
Location Privacy in
by jane-oiler
Casper. :. A Tale of two Systems. Mohamed . Mokbe...
Location Privacy
by pamella-moone
CompSci. 590.03. Instructor: Ashwin Machanavajjh...
Assessing the Commercial Potential of New Technologies
by pasty-toler
Patrick Emmerling, PhD, MBA. Licensing . Manager....
Metamaterials MEEN 3344 Christopher Acosta
by yoshiko-marsland
What are . Metamaterials. ?. They are an assembly...
Location Privacy in Casper
by tawny-fly
:. A Tale of two Systems. Mohamed . Mokbel. Unive...
Load More...