Sciweavers

383 search results - page 28 / 77
» The Study of 3D-from-2D Using Elimination
Sort
View
FUIN
2010
83views more  FUIN 2010»
13 years 7 months ago
Expressing Cardinality Quantifiers in Monadic Second-Order Logic over Trees
We study an extension of monadic second-order logic of order with the uncountability quantifier "there exist uncountably many sets". We prove that, over the class of fini...
Vince Bárány, Lukasz Kaiser, Alexand...
VC
2010
212views more  VC 2010»
13 years 4 months ago
Interactive evolutionary 3D fractal modeling
In this research we present a technique for the automatic generation of 3D art form, which allows designers to get access to large number of 3D shapes that can be altered interact...
Wenjun Pang, K. C. Hui
ICASSP
2011
IEEE
13 years 1 months ago
Optimal transmission strategies for channel capture mitigation in Cognitive Radio Networks
Abstract—Temporal Dynamic Spectrum Access (DSA) in Cognitive Radio Networks exploits time gaps between the primary users transmissions. In this work, the fundamental performance ...
Yingxi Liu, Nikhil Kundargi, Ahmed H. Tewfik
KESAMSTA
2011
Springer
13 years 24 days ago
Extending the JADE Agent Behaviour Model with JBehaviourTrees Framework
Creating modular behaviours in JADE using a traditional method such as the FSM (Finite State Machine) can be a difficult task to achieve. The first issue with FSMs is that they do...
Iva Bojic, Tomislav Lipic, Mario Kusek, Gordan Jez...
SIGSOFT
2007
ACM
14 years 10 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin