Sciweavers

3955 search results - page 658 / 791
» Comparing the Power of Robots
Sort
View
IVC
2007
124views more  IVC 2007»
13 years 9 months ago
Outlier rejection in high-dimensional deformable models
Deformable model tracking is a powerful methodology that allows us to track the evolution of high-dimensional parameter vectors from uncalibrated monocular video sequences. The co...
Christian Vogler, Siome Goldenstein, Jorge Stolfi,...
JAIR
2007
141views more  JAIR 2007»
13 years 9 months ago
Bin Completion Algorithms for Multicontainer Packing, Knapsack, and Covering Problems
Many combinatorial optimization problems such as the bin packing and multiple knapsack problems involve assigning a set of discrete objects to multiple containers. These problems ...
Alex S. Fukunaga, Richard E. Korf
JCM
2007
177views more  JCM 2007»
13 years 9 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
JCM
2007
191views more  JCM 2007»
13 years 9 months ago
Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results
- Wireless Local Area Networking standard (Wi-Fi) and the WPAN standard (Bluetooth and Zigbee) products utilize the same unlicensed 2.4 GHz ISM band. Co-existence between such wire...
Khaled Shuaib, Maryam Alnuaimi, Mohammed Boulmalf,...
TPDS
2008
125views more  TPDS 2008»
13 years 9 months ago
Computation-Efficient Multicast Key Distribution
Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied ...
Lihao Xu, Cheng Huang