Sciweavers

1663 search results - page 225 / 333
» Computer Security in the Real World
Sort
View
153
Voted
AINA
2009
IEEE
15 years 11 months ago
A Range-Only Tracking Algorithm for Wireless Sensor Networks
Over the last few years, target tracking in wireless sensor networks has become a topic of particular interest. This paper presents a tracking system intended for deployment in di...
Evangelos B. Mazomenos, Jeffrey S. Reeve, Neil M. ...
EDBT
2009
ACM
113views Database» more  EDBT 2009»
15 years 11 months ago
Query ranking in probabilistic XML data
Twig queries have been extensively studied as a major fragment of XPATH queries to query XML data. In this paper, we study PXMLRANK query, (Q, k), which is to rank top-k probabili...
Lijun Chang, Jeffrey Xu Yu, Lu Qin
ICRA
2009
IEEE
138views Robotics» more  ICRA 2009»
15 years 10 months ago
Which landmark is useful? Learning selection policies for navigation in unknown environments
Abstract— In general, a mobile robot that operates in unknown environments has to maintain a map and has to determine its own location given the map. This introduces significant...
Hauke Strasdat, Cyrill Stachniss, Wolfram Burgard
ISVC
2009
Springer
15 years 10 months ago
Exploiting Mutual Camera Visibility in Multi-camera Motion Estimation
Abstract. This paper addresses the estimation of camera motion and 3D reconstruction from image sequences for multiple independently moving cameras. If multiple moving cameras reco...
Christian Kurz, Thorsten Thormählen, Bodo Ros...
ICPR
2008
IEEE
15 years 10 months ago
A clustering algorithm combine the FCM algorithm with supervised learning normal mixture model
In this paper we propose a new clustering algorithm which combines the FCM clustering algorithm with the supervised learning normal mixture model; we call the algorithm as the FCM...
Wei Wang, Chunheng Wang, Xia Cui, Ai Wang