Sciweavers

24529 search results - page 4863 / 4906
» Computing on Authenticated Data
Sort
View
JCST
2008
140views more  JCST 2008»
13 years 10 months ago
ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks
The allocation of bandwidth to unlicensed users, without significantly increasing the interference on the existing licensed users, is a challenge for Ultra Wideband (UWB) networks....
Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal
CORR
2007
Springer
202views Education» more  CORR 2007»
13 years 10 months ago
Designing a Virtual Manikin Animation Framework Aimed at Virtual Prototyping
: In the industry, numerous commercial packages provide tools to introduce, and analyse human behaviour in the product's environment (for maintenance, ergonomics...), thanks t...
Antoine Rennuit, Alain Micaelli, Claude Andriot, F...
CPHYSICS
2007
106views more  CPHYSICS 2007»
13 years 10 months ago
The way towards thermonuclear fusion simulators
In parallel to the ITER project itself, many initiatives address complementary technological issues relevant to a fusion reactor, as well as many remaining scientific issues. One...
A. Bécoulet, Per Strand, H. Wilson, M. Roma...
IVC
2006
227views more  IVC 2006»
13 years 10 months ago
Automatic registration of overlapping 3D point clouds using closest points
While the SoftAssign algorithm imposes a two-way constraint embedded into the deterministic annealing scheme and the EMICP algorithm imposes a one-way constraint, they represent t...
Yonghuai Liu
JMLR
2008
230views more  JMLR 2008»
13 years 10 months ago
Exponentiated Gradient Algorithms for Conditional Random Fields and Max-Margin Markov Networks
Log-linear and maximum-margin models are two commonly-used methods in supervised machine learning, and are frequently used in structured prediction problems. Efficient learning of...
Michael Collins, Amir Globerson, Terry Koo, Xavier...
« Prev « First page 4863 / 4906 Last » Next »