Sciweavers

18094 search results - page 3564 / 3619
» The Architecture of Secure Systems
Sort
View
ABIALS
2008
Springer
14 years 4 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
3DIM
2007
IEEE
14 years 4 months ago
Cached k-d tree search for ICP algorithms
The ICP (Iterative Closest Point) algorithm is the de facto standard for geometric alignment of threedimensional models when an initial relative pose estimate is available. The ba...
Andreas Nüchter, Kai Lingemann, Joachim Hertz...
DASFAA
2007
IEEE
187views Database» more  DASFAA 2007»
14 years 4 months ago
OntoDB: An Ontology-Based Database for Data Intensive Applications
Recently, several approaches and systems were proposed to store in the same database data and the ontologies describing their meanings. We call these databases, ontology-based data...
Dehainsala Hondjack, Guy Pierra, Ladjel Bellatrech...
ICC
2007
IEEE
163views Communications» more  ICC 2007»
14 years 4 months ago
Packet Dispatching Algorithms with the Static Connection Patterns Scheme for Three-Stage Buffered Clos-Network Switches
—Rapid expansion of the Internet and increasing demand for multimedia services fosters an immediate need for the development of new high-capacity networks capable of supporting t...
Janusz Kleban, Hugo Santos
ICC
2007
IEEE
154views Communications» more  ICC 2007»
14 years 4 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
« Prev « First page 3564 / 3619 Last » Next »