Sciweavers

1805 search results - page 270 / 361
» A Theory of Closure Operators
Sort
View
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 10 months ago
Should I Stay or Should I Go? Worker Commitment to Virtual Organizations
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
Yulin Fang, Derrick J. Neufeld
ICECCS
2006
IEEE
90views Hardware» more  ICECCS 2006»
15 years 10 months ago
A Type System for the Relational Calculus of Object Systems
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academic research fields. Among many formalisms, rCOS, a refinement calculus of obje...
Liang Zhao, Xiangpeng Zhao, Quan Long, Zongyan Qiu
ICRA
2006
IEEE
98views Robotics» more  ICRA 2006»
15 years 10 months ago
Ridge-valley Path Planning for 3D Terrains
Abstract— This paper presents a tactical path planning algorithm for following ridges or valleys across a 3D terrain. The intent is to generate a path that enables an unmanned ve...
David L. Page, Andreas Koschan, Mongi A. Abidi, Ja...
IROS
2006
IEEE
197views Robotics» more  IROS 2006»
15 years 10 months ago
Heterogeneous Multi-Robot Localization in Unknown 3D Space
— This paper presents a self-localization strategy for a team of heterogenous mobile robots, including ground mobile robots of various sizes and wall-climbing robots. These robot...
Yi Feng 0002, Zhigang Zhu, Jizhong Xiao
SP
2006
IEEE
15 years 10 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson