Sciweavers

1057 search results - page 16 / 212
» its 1998
Sort
View
MVA
1998
119views Computer Vision» more  MVA 1998»
13 years 11 months ago
Integrated Techniques for Self-Organisation, Sampling, Habituation, and Motion-Tracking in Visual Robotics Applications
We summarise several techniques in use in our visual robotics research. Our aim is to develop robots that are thoroughly autonomous and adaptable. We describe a system that is ind...
Mark W. Peters, Arcot Sowmya
ISSS
1998
IEEE
103views Hardware» more  ISSS 1998»
14 years 2 months ago
False Path Analysis Based on a Hierarchical Control Representation
False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
Apostolos A. Kountouris, Christophe Wolinski
COCOON
2005
Springer
14 years 3 months ago
Complexity and Approximation of Satisfactory Partition Problems
The Satisfactory Partition problem consists of deciding if a given graph has a partition of its vertex set into two nonempty parts such that each vertex has at least as many neighb...
Cristina Bazgan, Zsolt Tuza, Daniel Vanderpooten
ICCCN
1998
IEEE
14 years 2 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
ICIP
1998
IEEE
14 years 11 months ago
Using the Fractal Code to Watermark Images
Our paper present a watermarking scheme basing on an insertion of similarities. In a rst part di erent watermarking techniques are presented and classed. In a second part our sche...
Patrick Bas, Jean-Marc Chassery, Franck Davoine