Sciweavers

406 search results - page 36 / 82
» The Computation and Application of the Generalized Inverse v...
Sort
View
UIST
2004
ACM
14 years 2 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
ESORICS
2009
Springer
14 years 9 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
ECAI
2006
Springer
14 years 15 days ago
Cheating Is Not Playing: Methodological Issues of Computational Game Theory
Abstract. Computational Game Theory is a way to study and evaluate behaviors using game theory models, via agent-based computer simulations. One of the most known example of this a...
Bruno Beaufils, Philippe Mathieu
EMMCVPR
2011
Springer
12 years 8 months ago
Curvature Regularization for Curves and Surfaces in a Global Optimization Framework
Length and area regularization are commonplace for inverse problems today. It has however turned out to be much more difficult to incorporate a curvature prior. In this paper we pr...
Petter Strandmark, Fredrik Kahl
BIRTHDAY
2008
Springer
13 years 10 months ago
Semiring-Based Soft Constraints
The semiring-based formalism to model soft constraint has been introduced in 1995 by Ugo Montanari and the authors of this paper. The idea was to make constraint programming more f...
Stefano Bistarelli, Francesca Rossi