Sciweavers

5550 search results - page 1109 / 1110
» Different Approaches to Proof Systems
Sort
View
IJRR
2010
88views more  IJRR 2010»
13 years 5 months ago
Extracting Object Contours with the Sweep of a Robotic Whisker Using Torque Information
Several recent studies have investigated the problem of object feature extraction with artificial whiskers. Many of these studies have used an approach in which the whisker is rot...
Joseph H. Solomon, Mitra J. Z. Hartmann
PERCOM
2011
ACM
13 years 2 months ago
RegReS: Adaptively maintaining a target density of regional services in opportunistic vehicular networks
Abstract—Pervasive vehicle-mounted mobile devices are increasingly common, and can be viewed as a large-scale ad hoc network on which collaborative, location-based services can b...
Emmanouil Koukoumidis, Li-Shiuan Peh, Margaret Mar...
CISS
2011
IEEE
13 years 2 months ago
Characterizing multiplexing and diversity in visual MIMO
—Mobile optical wireless has so far been limited to very short ranges for high data rate systems. It may be feasible to overcome the data rate limitations over large transmission...
Ashwin Ashok, Marco Gruteser, Narayan B. Mandayam,...
NAR
2011
215views Computer Vision» more  NAR 2011»
13 years 1 months ago
LSD: a leaf senescence database
By broad literature survey, we have developed a leaf senescence database (LSD, http://www .eplantsenescence.org/) that contains a total of 1145 senescence associated genes (SAGs) ...
Xiao-Chuan Liu, Zhonghai Li, Zhiqiang Jiang, Yi Zh...
ICDCS
2012
IEEE
12 years 1 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
« Prev « First page 1109 / 1110 Last » Next »