Sciweavers

993 search results - page 156 / 199
» Set Constraints on Regular Terms
Sort
View
MOBIHOC
2008
ACM
14 years 9 months ago
Delay-bounded routing in vehicular ad-hoc networks
Ad hoc networks formed by traveling vehicles are envisaged to become a common platform that will support a wide variety of applications, ranging from road safety to advertising an...
Antonios Skordylis, Niki Trigoni
ICDT
2010
ACM
259views Database» more  ICDT 2010»
14 years 7 months ago
Forward-XPath and extended register automata on data-trees
We consider a fragment of XPath named `forward-XPath', which contains all descendant and rightwards sibling axes as well as data equality and inequality tests. The satisfiabi...
Diego Figueira
ICRA
2009
IEEE
145views Robotics» more  ICRA 2009»
14 years 4 months ago
A two-steps next-best-view algorithm for autonomous 3D object modeling by a humanoid robot
— A novel approach is presented which aims at building autonomously visual models of unknown objects, using a humanoid robot. Although good methods have been proposed for the spe...
Torea Foissotte, Olivier Stasse, Adrien Escande, P...
ACCV
2009
Springer
14 years 4 months ago
A Probabilistic Model for Correspondence Problems Using Random Walks with Restart
Abstract. In this paper, we propose an efficient method for finding consistent correspondences between two sets of features. Our matching algorithm augments the discriminative pow...
Tae Hoon Kim, Kyoung Mu Lee, Sang Uk Lee
NORDSEC
2009
Springer
14 years 4 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...