Sciweavers

89222 search results - page 17677 / 17845
» Which
Sort
View
IJRR
2010
88views more  IJRR 2010»
13 years 5 months ago
Extracting Object Contours with the Sweep of a Robotic Whisker Using Torque Information
Several recent studies have investigated the problem of object feature extraction with artificial whiskers. Many of these studies have used an approach in which the whisker is rot...
Joseph H. Solomon, Mitra J. Z. Hartmann
IPL
2010
134views more  IPL 2010»
13 years 5 months ago
Parameterized algorithm for eternal vertex cover
In this paper we initiate the study of a "dynamic" variant of the classical Vertex Cover problem, the Eternal Vertex Cover problem introduced by Klostermeyer and Mynhard...
Fedor V. Fomin, Serge Gaspers, Petr A. Golovach, D...
ITIIS
2010
129views more  ITIIS 2010»
13 years 5 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
JAIR
2010
181views more  JAIR 2010»
13 years 5 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JBCS
2010
89views more  JBCS 2010»
13 years 5 months ago
Multicoordinated agreement for groups of agents
Agents in agreement protocols play well distinct roles. Proposers propose values to the acceptors, which will accept proposals and inform the learners so they detect that an agree...
Lásaro J. Camargos, Rodrigo Schmidt, Edmund...
« Prev « First page 17677 / 17845 Last » Next »