Sciweavers

3758 search results - page 561 / 752
» A Complete Subsumption Algorithm
Sort
View
ICRA
2006
IEEE
114views Robotics» more  ICRA 2006»
15 years 4 months ago
Blades: a New Class of Geometric Primitives for Feeding 3D Parts on Vibratory Tracks
Abstract— The vibratory bowl feeder remains the most common approach to the automated feeding (orienting) of industrial parts. We study the algorithmic design of devices on the b...
Onno C. Goemans, Kenneth Y. Goldberg, A. Frank van...
71
Voted
ICRA
2006
IEEE
75views Robotics» more  ICRA 2006»
15 years 4 months ago
Thinning-based Topological Exploration using Position Probability of Topological Nodes
- Exploration is the fundamental task of guiding a robot autonomously during mapping so that it covers the entire environment with its sensors. In the frontier-based exploration, a...
Tae-Bum Kwon, Jae-Bok Song
WIOPT
2006
IEEE
15 years 4 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
ACIVS
2006
Springer
15 years 4 months ago
Improvement of Conventional Deinterlacing Methods with Extrema Detection and Interpolation
Abstract. This article presents a new algorithm for spatial deinterlacing that could easily be integrated in a more complete deinterlacing system, typically a spatio-temporal motio...
Jérôme Roussel, Pascal Bertolino, Mar...
ACMSE
2006
ACM
15 years 4 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith