Sciweavers

1512 search results - page 77 / 303
» Principles of IEEE 802.11s
Sort
View
113
Voted
CVPR
2010
IEEE
15 years 9 months ago
Minimum length in the tangent bundle as a model for curve completion
The phenomenon of visual curve completion, where the visual system completes the missing part (e.g., due to occlusion) between two contour fragments, is a major problem in percept...
Guy Ben-Yosef, Ohad Ben Shahar
147
Voted
CVPR
2003
IEEE
15 years 9 months ago
Surface Reconstruction via Helmholtz Reciprocity with a Single Image Pair
This paper brings a novel method for three-dimensional reconstruction of surfaces that takes advantage of the symmetry resulting from alternating the positions of a camera and a l...
Peter H. Tu, Paulo R. S. Mendonça
108
Voted
DISCEX
2003
IEEE
15 years 9 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
117
Voted
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 9 months ago
Issues in Rational Planning in Multi-Agent Settings
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents operating in multi-agent environments. We use the...
Piotr J. Gmytrasiewicz
132
Voted
HOTOS
2003
IEEE
15 years 9 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste