Sciweavers

58933 search results - page 11687 / 11787
» Information
Sort
View
IJRR
2010
153views more  IJRR 2010»
15 years 1 months ago
Cooperative AUV Navigation using a Single Maneuvering Surface Craft
This paper describes the experimental implementation of an online algorithm for cooperative localization of submerged autonomous underwater vehicles (AUVs) supported by an autonom...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
INTERNET
2010
132views more  INTERNET 2010»
15 years 1 months ago
Peer-to-Peer 3D Streaming
In multi-user networked virtual environments such as Second Life, 3D streaming techniques have been used to progressively download and render 3D objects and terrain, so that a ful...
Shun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen
IR
2010
15 years 1 months ago
Statistical query expansion for sentence retrieval and its effects on weak and strong queries
The retrieval of sentences that are relevant to a given information need is a challenging passage retrieval task. In this context, the well-known vocabulary mismatch problem arises...
David E. Losada
175
Voted
ISF
2010
273views more  ISF 2010»
15 years 1 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
CCS
2010
ACM
15 years 27 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 11687 / 11787 Last » Next »