Sciweavers

4345 search results - page 741 / 869
» Temporal Constraint Networks
Sort
View
MMNS
2003
102views Multimedia» more  MMNS 2003»
13 years 9 months ago
A Heuristic Algorithm for the Multi-constrained Multicast Tree
Multicasting is an important communication mechanism for implementing real-time multimedia applications, which usually require the underlying network to provide a number of quality...
Wen-Lin Yang
IJCAI
1993
13 years 9 months ago
Fuzzy Causal Simulation in Process Engineering
: This paper presents a causal simulation method for incompletely known dynamic systems in process engineering. The causal model of a process is represented as both a causal networ...
Kouamana Bousson, Louise Travé-Massuy&egrav...
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
13 years 9 months ago
Quadratic Programming based data assimilation with passive drifting sensors for shallow water flows
We present a method for assimilating Lagrangian sensor measurement data into a Shallow Water Equation model. Using our method, the variational data assimilation problem is formulat...
Andrew Tinka, Issam S. Strub, Qingfang Wu, Alexand...
CVPR
2009
IEEE
13 years 9 months ago
VideoTrek: A vision system for a tag-along robot
We present a system that combines multiple visual navigation techniques to achieve GPS-denied, non-line-of-sight SLAM capability for heterogeneous platforms. Our approach builds o...
Oleg Naroditsky, Zhiwei Zhu, Aveek Das, Supun Sama...
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 9 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...