Sciweavers

2304 search results - page 372 / 461
» On the Vulnerability of Large Graphs
Sort
View
ICRA
2008
IEEE
205views Robotics» more  ICRA 2008»
14 years 5 months ago
Minimum time point assignment for coverage by two constrained robots
— This paper focuses on the assignment of discrete points to two robots, in the presence of geometric and kinematic constraints between the robots. The individual points have dif...
Nilanjan Chakraborty, Srinivas Akella, John T. Wen
SMI
2008
IEEE
107views Image Analysis» more  SMI 2008»
14 years 5 months ago
Approximate topological matching of quadrilateral meshes
Abstract In this paper, we study the problem of approximate topological matching for quadrilateral meshes, that is, the problem of finding as large a set as possible of matching p...
David Eppstein, Michael T. Goodrich, Ethan Kim, Ra...
VL
2008
IEEE
133views Visual Languages» more  VL 2008»
14 years 5 months ago
Analyzing a socio-technical visualization tool using usability inspection methods
Ariadne is a novel visualization tool that allows end users to explore the socio-technical relationships in software development projects. Essentially the visualization is a varia...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
3DIM
2007
IEEE
14 years 5 months ago
Surface Reconstruction from Point Clouds by Transforming the Medial Scaffold
We propose an algorithm for surface reconstruction from unorganized points based on a view of the sampling process as a deformation from the original surface. In the course of thi...
Ming-Ching Chang, Frederic F. Leymarie, Benjamin B...
CVPR
2007
IEEE
14 years 5 months ago
Single View Human Action Recognition using Key Pose Matching and Viterbi Path Searching
3D human pose recovery is considered as a fundamental step in view-invariant human action recognition. However, inferring 3D poses from a single view usually is slow due to the la...
Fengjun Lv, Ramakant Nevatia