Sciweavers

2243 search results - page 106 / 449
» Contracts for Mobile Processes
Sort
View
ICLP
2010
Springer
15 years 2 months ago
Runtime Addition of Integrity Constraints in an Abductive Proof Procedure
Abductive Logic Programming is a computationally founded representation of abductive reasoning. In most ALP frameworks, integrity constraints express domainspecific logical relati...
Marco Alberti, Marco Gavanelli, Evelina Lamma
CIMAGING
2009
94views Hardware» more  CIMAGING 2009»
15 years 1 months ago
Iterative demosaicking accelerated: theory and fast noniterative implementations
Color image demosaicking is a key process in the digital imaging pipeline. In this paper, we present a rigorous treatment of a classical demosaicking algorithm based on alternatin...
Yue M. Lu, Mina Karzand, Martin Vetterli
RAS
2007
98views more  RAS 2007»
15 years 3 months ago
Occupancy grids building by sonar and mobile robot
In this paper, a modified method for occupancy grid map building by a moving mobile robot and a scanning ultrasonic range-finder is proposed. The map building process consists o...
Sv. Noykov, Ch. Roumenin
ICRA
2007
IEEE
197views Robotics» more  ICRA 2007»
15 years 10 months ago
Detecting and Tracking Level Sets of Scalar Fields using a Robotic Sensor Network
— We introduce an algorithm which detects and traces a specified level set of a scalar field (a contour) on a plane. A network of static sensor nodes with limited communication...
Karthik Dantu, Gaurav S. Sukhatme
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
15 years 9 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan