Sciweavers

9687 search results - page 1881 / 1938
» On Natural Mobility Models
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 3 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISRR
2005
Springer
118views Robotics» more  ISRR 2005»
14 years 3 months ago
A Provably Consistent Method for Imposing Sparsity in Feature-Based SLAM Information Filters
An open problem in Simultaneous Localization and Mapping (SLAM) is the development of algorithms which scale with the size of the environment. A few promising methods exploit the ...
Matthew Walter, Ryan Eustice, John J. Leonard
CHI
2004
ACM
14 years 3 months ago
Topobo: a constructive assembly system with kinetic memory
We introduce Topobo, a 3D constructive assembly system embedded with kinetic memory, the ability to record and playback physical motion. Unique among modeling systems is Topoboʼs...
Hayes Raffle, Amanda J. Parkes, Hiroshi Ishii
COMPGEOM
2004
ACM
14 years 3 months ago
Low-dimensional embedding with extra information
A frequently arising problem in computational geometry is when a physical structure, such as an ad-hoc wireless sensor network or a protein backbone, can measure local information...
Mihai Badoiu, Erik D. Demaine, Mohammad Taghi Haji...
CSCW
2004
ACM
14 years 3 months ago
Territoriality in collaborative tabletop workspaces
Researchers seeking alternatives to traditional desktop computers have begun exploring the potential collaborative benefits of digital tabletop displays. However, there are still ...
Stacey D. Scott, M. Sheelagh T. Carpendale, Kori M...
« Prev « First page 1881 / 1938 Last » Next »