Sciweavers

796 search results - page 75 / 160
» Spoofing prevention method
Sort
View
MOBIHOC
2006
ACM
14 years 9 months ago
Robust distributed node localization with error management
Location knowledge of nodes in a network is essential for many tasks such as routing, cooperative sensing, or service delivery in ad hoc, mobile, or sensor networks. This paper in...
Juan Liu, Ying Zhang, Feng Zhao
IWOCA
2009
Springer
149views Algorithms» more  IWOCA 2009»
14 years 4 months ago
Randomized Postoptimization of Covering Arrays
The construction of covering arrays with the fewest rows remains a challenging problem. Most computational and recursive constructions result in extensive repetition of coverage. W...
Peyman Nayeri, Charles J. Colbourn, Goran Konjevod
IUI
2010
ACM
14 years 4 months ago
Usability guided key-target resizing for soft keyboards
Soft keyboards offer touch-capable mobile and tabletop devices many advantages such as multiple language support and space for larger graphical displays. On the other hand, becaus...
Asela Gunawardana, Tim Paek, Christopher Meek
ICPR
2008
IEEE
14 years 4 months ago
Non-rigid image registration based on the globally optimized correspondences
In this paper, we propose a new approach to the non-rigid image registration. This problem can be easily attacked if we can find regularly distributed correspondence points over ...
Hyung il Koo, Jung Gap Kuk, Nam Ik Cho
IROS
2008
IEEE
115views Robotics» more  IROS 2008»
14 years 4 months ago
A framework for optimal gait generation via learning optimal control using virtual constraint
— This paper proposes an optimal gait generation framework using virtual constraint and learning optimal control. In this method, firstly, we add a constraint by a virtual poten...
Satoshi Satoh, Kenji Fujimoto, Sang-Ho Hyon