Sciweavers

403 search results - page 12 / 81
» Plenoptic path and its applications
Sort
View
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 9 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
MCS
2009
Springer
14 years 2 months ago
True Path Rule Hierarchical Ensembles
Abstract. Hierarchical classification problems gained increasing attention within the machine learning community, and several methods for hierarchically structured taxonomies have...
Giorgio Valentini
HASE
2007
IEEE
14 years 2 months ago
SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths
SyncProbe improves the end-to-end predictability of distributed systems by providing applications with a real-time estimate of the maximum expected message delay (upper bound on c...
Jawwad Shamsi, Monica Brockmeyer
ICRA
1999
IEEE
130views Robotics» more  ICRA 1999»
14 years 4 days ago
EquiDistance Diagram: A New Roadmap Method for Path Planning
This paper introduces a novel heuristic nmdmap method for path planning, one that is inspired by the Vomnoi diagmm concept, but easiZy applicable to geneml configurntion spaces. T...
S. Sathiya Keerthi, Chong Jin Ong, Eugene Huang, E...
DGCI
2009
Springer
13 years 11 months ago
A Linear Time and Space Algorithm for Detecting Path Intersection
For discrete sets coded by the Freeman chain describing their contour, several linear algorithms have been designed for determining their shape properties. Most of them are based ...
Srecko Brlek, Michel Koskas, Xavier Provenç...