Sciweavers

998 search results - page 138 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
IROS
2009
IEEE
188views Robotics» more  IROS 2009»
14 years 4 months ago
Novelty detection and 3D shape retrieval based on Gaussian Mixture Models for autonomous surveillance robotics
Abstract— This paper describes an efficient method for retrieving the 3-dimensional shape associated to novelties in the environment of an autonomous robot, which is equipped wi...
Pedro Núñez Trujillo, Paulo Drews, R...
SAMT
2009
Springer
159views Multimedia» more  SAMT 2009»
14 years 4 months ago
Interoperable Multimedia Metadata through Similarity-Based Semantic Web Service Discovery
The increasing availability of multimedia (MM) resources, Web services as well as content, on the Web raises the need to automatically discover and process resources out of distrib...
Stefan Dietze, Neil Benn, John Domingue, Alex Conc...
MOBIWAC
2009
ACM
14 years 4 months ago
MeshScan: fast and efficient handoff in IEEE802.11 mesh networks
Handoff delay is one of the major problems in Wireless Mesh Network (WMN) that needs to be solved in order to allow time-critical and real-time applications run continuously durin...
Yin Chen, Karol Kowalik, Mark Davis
HAPTICS
2008
IEEE
14 years 4 months ago
Non-contact Method for Producing Tactile Sensation Using Airborne Ultrasound
This paper describes a new tactile device which produces stress fields in 3D space. Combined with 3D stereoscopic displays, this device is expected to provide high-fidelity tacti...
Takayuki Iwamoto, Mari Tatezono, Hiroyuki Shinoda
HASE
2008
IEEE
14 years 4 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...