Sciweavers

260 search results - page 36 / 52
» Degree constrained subgraphs
Sort
View
KBSE
2008
IEEE
14 years 2 months ago
Using n-grams to rapidly characterise the evolution of software code
Text-based approaches to the analysis of software evolution are attractive because of the fine-grained, token-level comparisons they can generate. The use of such approaches has, ...
Austen Rainer, Peter C. R. Lane, James A. Malcolm,...
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
14 years 2 months ago
A Qualitative Visual Servoing to ensure the Visibility Constraint
— This paper describes an original control law called qualitative servoing. The particularity of this method is that no specific desired value is specified for the visual featu...
Anthony Remazeilles, Nicolas Mansard, Franç...
TGC
2005
Springer
14 years 1 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
AACC
2004
Springer
14 years 1 months ago
Using Document Dimensions for Enhanced Information Retrieval
Conventional document search techniques are constrained by attempting to match individual keywords or phrases to source documents. Thus, these techniques miss out documents that co...
Thimal Jayasooriya, Suresh Manandhar
ICRA
1998
IEEE
116views Robotics» more  ICRA 1998»
14 years 21 days ago
Dimensional Analysis and Selective Distortion in Scaled Bilateral Telemanipulation
ThiJ puper addresses the issue of dynamic similarity and intensive property invariance in scaled bilateral naunipulation, and ofsers a design methodology bused on these considerat...
Michael Goldfarb