Sciweavers

2600 search results - page 498 / 520
» Tracking Complex Objects Using Graphical Object Models
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
ESAW
2007
Springer
14 years 1 months ago
Multi-agent Simulation to Implementation: A Practical Engineering Methodology for Designing Space Flight Operations
OCAMS is a practical engineering application of multi-agent systems technology, involving redesign of the tools and practices in a complex, distributed system. OCAMS is designed to...
William J. Clancey, Maarten Sierhuis, Chin Seah, C...
EUROPAR
2007
Springer
14 years 1 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
ICRA
2006
IEEE
148views Robotics» more  ICRA 2006»
14 years 1 months ago
Surface Patch Reconstruction via Curve Sampling
This paper introduces a method that reconstructs a surface patch by sampling along three concurrent curves on the surface with a touch sensor. These data curves, each lying in a d...
Yan-Bin Jia, Liangchuan Mi, Jiang Tian
ICCV
2005
IEEE
14 years 1 months ago
More-Than-Topology-Preserving Flows for Active Contours and Polygons
Active contour and active polygon models have been used widely for image segmentation. In some applications, the topology of the object(s) to be detected from an image is known a ...
Ganesh Sundaramoorthi, Anthony J. Yezzi