Sciweavers

2200 search results - page 365 / 440
» The Generalized Pignistic Transformation
Sort
View
SMA
2010
ACM
231views Solid Modeling» more  SMA 2010»
13 years 9 months ago
Conservative swept volume boundary approximation
We present a novel technique for approximating the boundary of a swept volume. The generator given by an input triangle mesh is rendered under all rigid transformations of a discr...
Andreas von Dziegielewski, R. Erbes, Elmar Sch&oum...
ADHOC
2007
164views more  ADHOC 2007»
13 years 9 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
AMC
2007
134views more  AMC 2007»
13 years 9 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
CGF
2010
101views more  CGF 2010»
13 years 9 months ago
High Fidelity Scan Merging
For each scanned object 3D triangulation laser scanners deliver multiple sweeps corresponding to multiple laser motions and orientations. The problem of aligning these scans has b...
J. Digne, J.-M. Morel, N. Audfray, C. Lartigue
CII
2008
100views more  CII 2008»
13 years 9 months ago
Knowledge formalization in experience feedback processes: An ontology-based approach
Because of the current trend of integration and interoperability of industrial systems, their size and complexity continue to grow making it more difficult to analyze, to understa...
Bernard Kamsu Foguem, Thierry Coudert, C. Bé...