Sciweavers

1147 search results - page 154 / 230
» Transformation of Access Rights
Sort
View
PE
2007
Springer
100views Optimization» more  PE 2007»
13 years 10 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
RAS
2007
109views more  RAS 2007»
13 years 10 months ago
On point-to-point motion planning for underactuated space manipulator systems
In free-floating mode, space manipulator systems have their actuators turned off, and exhibit nonholonomic behavior due to angular momentum conservation. The system is underactua...
Ioannis Tortopidis, Evangelos Papadopoulos
PVLDB
2010
129views more  PVLDB 2010»
13 years 9 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...
POPL
2004
ACM
14 years 11 months ago
Free theorems in the presence of seq
Parametric polymorphism constrains the behavior of pure functional programs in a way that allows the derivation of interesting theorems about them solely from their types, i.e., v...
Janis Voigtländer, Patricia Johann
PR
2007
141views more  PR 2007»
13 years 10 months ago
A Riemannian approach to graph embedding
In this paper, we make use of the relationship between the Laplace–Beltrami operator and the graph Laplacian, for the purposes of embedding a graph onto a Riemannian manifold. T...
Antonio Robles-Kelly, Edwin R. Hancock