Sciweavers

1898 search results - page 216 / 380
» Weak Keys for IDEA
Sort
View
PRESENCE
2006
102views more  PRESENCE 2006»
13 years 10 months ago
The Usability of Collaborative Virtual Environments and Methods for the Analysis of Interaction
This paper describes two methods for analyzing interactions in collaborative virtual environments (CVEs): one whereby quantitative data are captured, interaction is categorized in...
Ralph Schroeder, Ilona Heldal, Jolanda G. Tromp
IJRR
2007
100views more  IJRR 2007»
13 years 10 months ago
Exactly Sparse Extended Information Filters for Feature-based SLAM
Recent research concerning the Gaussian canonical form for Simultaneous Localization and Mapping (SLAM) has given rise to a handful of algorithms that attempt to solve the SLAM sc...
Matthew Walter, Ryan Eustice, John J. Leonard
TON
2008
155views more  TON 2008»
13 years 10 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
JUCS
2007
100views more  JUCS 2007»
13 years 10 months ago
On BCK Algebras - Part I.a: An Attempt to Treat Unitarily the Algebras of Logic. New Algebras
: Since all the algebras connected to logic have, more or less explicitely, an associated order relation, it follows that they have two presentations, dual to each other. We classi...
Afrodita Iorgulescu
DCG
2000
67views more  DCG 2000»
13 years 10 months ago
A Theorem on Higher Bruhat Orders
We show that inclusion order and single-step inclusion coincide for higher Bruhat orders B(n; 2), i.e., B(n; 2) = B (n; 2). Mathematics Subject Classi cations (1991). 06A06, 51G05,...
Stefan Felsner, Helmut Weil