Sciweavers

501 search results - page 72 / 101
» Rough Sets
Sort
View
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
14 years 2 months ago
Automatic high-precision self-calibration of camera-robot systems
— In this article a new method is presented to obtain a full and precise calibration of camera-robot systems with eyein-hand cameras. It achieves a simultaneous and numerically s...
Andreas Jordt, Nils T. Siebel, Gerald Sommer
FOCS
2008
IEEE
14 years 2 months ago
Computing the Tutte Polynomial in Vertex-Exponential Time
The deletion–contraction algorithm is perhaps the most popular method for computing a host of fundamental graph invariants such as the chromatic, flow, and reliability polynomi...
Andreas Björklund, Thore Husfeldt, Petteri Ka...
DSN
2007
IEEE
14 years 2 months ago
R-Sentry: Providing Continuous Sensor Services against Random Node Failures
The success of sensor-driven applications is reliant on whether a steady stream of data can be provided by the underlying system. This need, however, poses great challenges to sen...
Shengchao Yu, Yanyong Zhang
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 2 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
DSOM
2007
Springer
14 years 1 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...