Sciweavers

8496 search results - page 1638 / 1700
» Problem Solving and Complex Systems
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ATAL
2006
Springer
13 years 11 months ago
Multiply-constrained distributed constraint optimization
Distributed constraint optimization (DCOP) has emerged as a useful technique for multiagent coordination. While previous DCOP work focuses on optimizing a single team objective, i...
Emma Bowring, Milind Tambe, Makoto Yokoo
ECCV
2006
Springer
13 years 11 months ago
Segmentation and Guidance of Multiple Rigid Objects for Intra-operative Endoscopic Vision
Abstract. This paper presents an endoscopic vision framework for modelbased 3D guidance of surgical instruments used in robotized laparoscopic surgery. In order to develop such a s...
Christophe Doignon, Florent Nageotte, Michel de Ma...
CSCW
2008
ACM
13 years 9 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
RSS
2007
145views Robotics» more  RSS 2007»
13 years 9 months ago
Semantic Modeling of Places using Objects
— While robot mapping has seen massive strides , higher level abstractions in map representation are still not widespread. Maps containing semantic concepts such as objects and l...
Ananth Ranganathan, Frank Dellaert
« Prev « First page 1638 / 1700 Last » Next »