Sciweavers

5451 search results - page 1046 / 1091
» Typed Operational Semantics
Sort
View
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
14 years 4 months ago
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model
—We present a novel particle filter implementation for estimating the pose of tags in the environment with respect to an RFID-equipped robot. This particle filter combines sign...
Travis Deyle, Charles C. Kemp, Matthew S. Reynolds
NDSS
2008
IEEE
14 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
VTC
2008
IEEE
141views Communications» more  VTC 2008»
14 years 4 months ago
Mobile WiMAX: Performance Analysis and Comparison with Experimental Results
— The demand for broadband mobile services continues to grow. Conventional high-speed broadband solutions are based on wired-access technologies such as digital subscriber line (...
Mai Tran, George Zaggoulos, Andrew R. Nix, Angela ...
ACRI
2008
Springer
14 years 4 months ago
On the Representation of Gliders in Rule 54 by De Bruijn and Cycle Diagrams
Abstract. Rule 54, in Wolfram’s notation, is one of elementary yet complexly behaving one-dimensional cellular automata. The automaton supports gliders, glider guns and other non...
Genaro Juárez Martínez, Andrew Adama...
CVPR
2007
IEEE
14 years 4 months ago
A Graph Reduction Method for 2D Snake Problems
Energy-minimizing active contour models (snakes) have been proposed for solving many computer vision problems such as object segmentation, surface reconstruction, and object track...
Jianhua Yan, Keqi Zhang, Chengcui Zhang, Shu-Ching...
« Prev « First page 1046 / 1091 Last » Next »