Sciweavers

360 search results - page 41 / 72
» Constraint Checking with Partial Information
Sort
View
IEEEIAS
2008
IEEE
14 years 2 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
GEOINFORMATICA
2008
144views more  GEOINFORMATICA 2008»
13 years 7 months ago
Area Collapse and Road Centerlines based on Straight Skeletons
Skeletonization of polygons is a technique, which is often applied to problems of cartography and geographic information science. Especially it is needed for generalization tasks ...
Jan-Henrik Haunert, Monika Sester
ICRA
2010
IEEE
123views Robotics» more  ICRA 2010»
13 years 6 months ago
Robotic motion planning in dynamic, cluttered, uncertain environments
— This paper presents a strategy for planning robot motions in dynamic, cluttered, and uncertain environments. Successful and efficient operation in such environments requires r...
Noel E. Du Toit, Joel W. Burdick
IAT
2010
IEEE
13 years 5 months ago
Intention Recognition with Event Calculus Graphs
Intention recognition has significant applications in ambient intelligence, for example in assisted living and care of the elderly, in games and in intrusion and other crime detec...
Fariba Sadri
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon