Sciweavers

1228 search results - page 35 / 246
» Manipulation of Pose Distributions
Sort
View
CONEXT
2008
ACM
15 years 5 months ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer
197
Voted
GIL
2011
14 years 3 months ago
Business Process Support using RFID-based Information Services in the Distribution of Fresh Fruits and Vegetables
: The efficient distribution of fresh produce poses many challenges to enterprises in the fruit and vegetable sector. The exchange of product- and processrelated information betwee...
Robert Reiche, Richard J. Lehmann, Melanie Fritz, ...
ATAL
2008
Springer
15 years 6 months ago
Complexity of terminating preference elicitation
Complexity theory is a useful tool to study computational issues surrounding the elicitation of preferences, as well as the strategic manipulation of elections aggregating togethe...
Toby Walsh
IROS
2009
IEEE
154views Robotics» more  IROS 2009»
15 years 10 months ago
Real-time perception-guided motion planning for a personal robot
— This paper presents significant steps towards the online integration of 3D perception and manipulation for personal robotics applications. We propose a modular and distributed...
Radu Bogdan Rusu, Ioan Alexandru Sucan, Brian P. G...
IPPS
1996
IEEE
15 years 8 months ago
Commutativity Analysis: A Technique for Automatically Parallelizing Pointer-Based Computations
This paper introduces an analysis technique, commutativity analysis, for automatically parallelizing computations that manipulate dynamic, pointer-based data structures. Commutati...
Martin C. Rinard, Pedro C. Diniz