Sciweavers

481 search results - page 51 / 97
» Validity of First-Order Knowledge Bases
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
ICPR
2008
IEEE
14 years 2 months ago
Augment document image binarization by learning
Conventional Binarization methods try to obtain optimal results based on the single image only. They make distinct diversity of binarization quality sometimes even for images of t...
Yuanping Zhu
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
14 years 2 months ago
Identification of the payload inertial parameters of industrial manipulators
— In this paper we present four methods for the identification of the inertial parameters of the load of a manipulator. The knowledge of the values of these parameters can be use...
Wisama Khalil, Maxime Gautier, Philippe Lemoine
ICRA
2007
IEEE
137views Robotics» more  ICRA 2007»
14 years 2 months ago
A Hybrid Active Global Localisation Algorithm for Mobile Robots
— Localisation is one of the most important tasks to be accomplished in order to realize the complete autonomy of a mobile robot. In this paper, a new strategy for global localis...
Andrea Gasparri, Stefano Panzieri, Federica Pascuc...
ROBOCOMM
2007
IEEE
14 years 1 months ago
Achieving connectivity through coalescence in mobile robot networks
—Coalescence is the problem of isolated mobile robots independently searching for peers with the goal of forming a single connected network. This paper analyzes coalescence time ...
Sameera Poduri, Gaurav S. Sukhatme