Sciweavers

2181 search results - page 344 / 437
» The restriction scaffold problem
Sort
View
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
13 years 10 months ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
ATAL
2010
Springer
13 years 10 months ago
Collective argument evaluation as judgement aggregation
cting knowledge base can be seen abstractly as a set of arguments and a binary relation characterising conflict among them. There may be multiple plausible ways to evaluate confli...
Iyad Rahwan, Fernando Tohmé
AUTOMATICA
2007
191views more  AUTOMATICA 2007»
13 years 9 months ago
Navigation function-based visual servo control
Abstract: I n this paper, the mapping between the desired camera feature vector and the desired camera pose (i.e., the position, and orientation) is investigated to develop a measu...
Jian Chen, Darren M. Dawson, Warren E. Dixon, Vila...
CGF
2008
262views more  CGF 2008»
13 years 9 months ago
Global Correspondence Optimization for Non-Rigid Registration of Depth Scans
We present a registration algorithm for pairs of deforming and partial range scans that addresses the challenges of non-rigid registration within a single non-linear optimization....
Hao Li, Robert W. Sumner, Mark Pauly
CN
2008
126views more  CN 2008»
13 years 9 months ago
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures
Failure resilience is a desired feature of the Internet. Most traditional restoration architectures assume single-failure assumption, which is not adequate in present day WDM opti...
Pallab Datta, Arun K. Somani