Sciweavers

1517 search results - page 270 / 304
» Time and Location Based Services with Access Control
Sort
View
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
14 years 3 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
KES
2009
Springer
14 years 3 months ago
Urban Vehicle Tracking Using a Combined 3D Model Detector and Classifier
This paper presents a tracking system for vehicles in urban traffic scenes. The task of automatic video analysis for existing CCTV infrastructure is of increasing interest due to b...
Norbert Buch, Fei Yin, James Orwell, Dimitrios Mak...
ICRA
2007
IEEE
203views Robotics» more  ICRA 2007»
14 years 3 months ago
Energy Saving Target Tracking Using Mobile Sensor Networks
Abstract Minimizing the energy consumption of target tracking using a mobile sensor network is proved to be NPcomplete. Based on proximity graph, an approximately optimal solution ...
Yingying Li, Yun-Hui Liu
HPCC
2005
Springer
14 years 2 months ago
A Loop-Aware Search Strategy for Automated Performance Analysis
Abstract. Automated online search is a powerful technique for performance diagnosis. Such a search can change the types of experiments it performs while the program is running, mak...
Eli D. Collins, Barton P. Miller
CGF
2008
137views more  CGF 2008»
13 years 8 months ago
Exploiting Visibility Correlation in Direct Illumination
The visibility function in direct illumination describes the binary visibility over a light source, e.g., an environment map. Intuitively, the visibility is often strongly correla...
Petrik Clarberg, Tomas Akenine-Möller