Sciweavers

167 search results - page 25 / 34
» Constraints for closest point finding
Sort
View
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 8 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
ICPR
2006
IEEE
14 years 9 months ago
Using Specularities to Recover Multiple Light Sources in the Presence of Texture
Recovering multiple point light sources from a sparse set of photographs in which objects of unknown texture can move is challenging. This is because both diffuse and specular ref...
Pascal Lagger, Pascal Fua
HICSS
2000
IEEE
136views Biometrics» more  HICSS 2000»
14 years 11 days ago
Agent-based Team Aiding in a Time Critical Task
In this paper we evaluate the effectiveness of agent-based aiding in support of a time-critical team-planning task for teams of both humans and heterogeneous software agents. The ...
Terry R. Payne, Terri L. Lenox, Susan Hahn, Michae...
CEC
2007
IEEE
13 years 12 months ago
Three-dimensional offline path planning for UAVs using multiobjective evolutionary algorithms
In this paper, we present 3D offline path planner for Unmanned Aerial Vehicles (UAVs) using Multiobjective Evolutionary Algorithms for finding solutions corresponding to conflictin...
Shashi Mittal, Kalyanmoy Deb
EATIS
2007
ACM
13 years 12 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler