Sciweavers

4529 search results - page 876 / 906
» Position Based Cryptography
Sort
View
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 11 months ago
Online Scheduling to Minimize the Maximum Delay Factor
In this paper two scheduling models are addressed. First is the standard model (unicast) where requests (or jobs) are independent. The other is the broadcast model where broadcast...
Chandra Chekuri, Benjamin Moseley
CORR
2008
Springer
193views Education» more  CORR 2008»
13 years 11 months ago
Faster and better: a machine learning approach to corner detection
The repeatability and efficiency of a corner detector determines how likely it is to be useful in a real-world application. The repeatability is importand because the same scene vi...
Edward Rosten, Reid Porter, Tom Drummond
DCG
2010
289views more  DCG 2010»
13 years 11 months ago
Algorithms for Approximate Shortest Path Queries on Weighted Polyhedral Surfaces
We consider the well known geometric problem of determining shortest paths between pairs of points on a polyhedral surface P, where P consists of triangular faces with positive we...
Lyudmil Aleksandrov, Hristo Djidjev, Hua Guo, Anil...
AROBOTS
2006
108views more  AROBOTS 2006»
13 years 11 months ago
Relative localization using path odometry information
All mobile bases suffer from localization errors. Previous approaches to accommodate for localization errors either use external sensors such as lasers or sonars, or use internal s...
Nakju Lett Doh, Howie Choset, Wan Kyun Chung
BMCBI
2006
141views more  BMCBI 2006»
13 years 11 months ago
Identification of consensus RNA secondary structures using suffix arrays
Background: The identification of a consensus RNA motif often consists in finding a conserved secondary structure with minimum free energy in an ensemble of aligned sequences. How...
Mohammad Anwar, Truong Nguyen, Marcel Turcotte