Sciweavers

569 search results - page 15 / 114
» Using Constraints for Exploring Catalogs
Sort
View
APVIS
2004
13 years 9 months ago
Skeletal Animation for the Exploration of Graphs
The topic of skeletal animation and its associated techniques have previously been applied in the area of animating computer-generated characters for motion pictures and computer ...
Damian Merrick, Tim Dwyer
PODS
1994
ACM
131views Database» more  PODS 1994»
13 years 11 months ago
Constraint Checking with Partial Information
Abstract Appears in Proceedings of the Thirteenth Symposium on Principles of Database Systems, 1994 Ashish Gupta Yehoshua Sagivy Je rey D. Ullman Jennifer Widom Dept. of Computer S...
Ashish Gupta, Yehoshua Sagiv, Jeffrey D. Ullman, J...
ISSS
1997
IEEE
103views Hardware» more  ISSS 1997»
13 years 11 months ago
Fast and Extensive System-Level Memory Exploration for ATM Applications
In this paper, our memory architecture exploration methodology and CAD techniques for network protocol applications are presented. Prototype tools have been implemented, and appli...
Peter Slock, Sven Wuytack, Francky Catthoor, Gjalt...
ENGL
2007
91views more  ENGL 2007»
13 years 7 months ago
RRT-based strategies for sensor-based exploration
—Real mobile robots should be able to build an abstract representation of the physical environment, in order to navigate and to work in such environment. We present a method for ...
Abraham Sánchez López, Judith Le&oac...
ICDCSW
2007
IEEE
14 years 1 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan