Sciweavers

5544 search results - page 1007 / 1109
» Three Inadequate Models
Sort
View
JAIR
2006
134views more  JAIR 2006»
15 years 2 months ago
Multi-Issue Negotiation with Deadlines
This paper studies bilateral multi-issue negotiation between self-interested autonomous agents. Now, there are a number of different procedures that can be used for this process; ...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
121
Voted
JUCS
2008
149views more  JUCS 2008»
15 years 2 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
JFR
2006
130views more  JFR 2006»
15 years 2 months ago
A mobile robot system for automatic floor marking
This paper describes a patent awarded system for automatically marking the positions of stands for a trade fair or exhibition. The system has been in operation since August 2003 a...
Patric Jensfelt, Gunnar Gullstrand, Erik Före...
ECCC
2007
90views more  ECCC 2007»
15 years 2 months ago
Parameterized Proof Complexity: a Complexity Gap for Parameterized Tree-like Resolution
We propose a proof-theoretic approach for gaining evidence that certain parameterized problems are not fixed-parameter tractable. We consider proofs that witness that a given pro...
Stefan S. Dantchev, Barnaby Martin, Stefan Szeider
JMIV
2006
124views more  JMIV 2006»
15 years 2 months ago
Segmentation of a Vector Field: Dominant Parameter and Shape Optimization
Vector field segmentation methods usually belong to either of three classes: methods which segment regions homogeneous in direction and/or norm, methods which detect discontinuiti...
Tristan Roy, Eric Debreuve, Michel Barlaud, Gilles...
« Prev « First page 1007 / 1109 Last » Next »