Sciweavers

10805 search results - page 1951 / 2161
» Mapping Computation with No Memory
Sort
View
ICRA
2009
IEEE
122views Robotics» more  ICRA 2009»
15 years 2 months ago
Utilizing reflection properties of surfaces to improve mobile robot localization
Abstract-- A main difficulty that arises in the context of probabilistic localization is the design of an appropriate observation model, i.e., determining the likelihood of a senso...
Maren Bennewitz, Cyrill Stachniss, Sven Behnke, Wo...
DEBU
2010
127views more  DEBU 2010»
15 years 1 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 11 months ago
Left invertibility of discrete-time output-quantized systems: the linear case with finite inputs
This paper studies left invertibility of discrete-time linear output-quantized systems. Quantized outputs are generated according to a given partition of the state-space, while inp...
Nevio Dubbini, Benedetto Piccoli, Antonio Bicchi
JSAC
2011
191views more  JSAC 2011»
14 years 11 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
TIT
2011
125views more  TIT 2011»
14 years 11 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
« Prev « First page 1951 / 2161 Last » Next »