Sciweavers

2414 search results - page 55 / 483
» Computing Normal Subgroups
Sort
View
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
14 years 2 months ago
Comparison of surface normal estimation methods for range sensing applications
— As mobile robotics is gradually moving towards a level of semantic environment understanding, robust 3D object recognition plays an increasingly important role. One of the most...
Klaas Klasing, Daniel Althoff, Dirk Wollherr, Mart...
ICC
2008
IEEE
14 years 2 months ago
Normal Graphs for Downlink Multiuser MIMO Scheduling
—Inspired by the success of the low-density parity-check (LDPC) codes in the field of error-control coding, in this paper we propose transforming the downlink multiuser multiple-...
Jung-Chieh Chen, Cheng-Hsuan Wu, Chao-Kai Wen, Yao...
LICS
2007
IEEE
14 years 1 months ago
Strong Normalization as Safe Interaction
When enriching the λ-calculus with rewriting, union types may be needed to type all strongly normalizing terms. However, with rewriting, the elimination rule (∨ E) of union typ...
Colin Riba
MMM
2007
Springer
178views Multimedia» more  MMM 2007»
14 years 1 months ago
Normalization and Alignment of 3D Objects Based on Bilateral Symmetry Planes
Abstract. Recent advancements in 3D scanning technologies have inspired the development of effective methods for matching and retrieving 3D objects. A common pre-processing stage ...
Jefry Tedjokusumo, Wee Kheng Leow