Sciweavers

1712 search results - page 293 / 343
» A Computational Approach to Binding Theory
Sort
View
RAS
2002
105views more  RAS 2002»
15 years 1 months ago
Visually guided manipulation tasks
In this paper, we present a framework for a robotic system with the ability to perform real-world manipulation tasks. The complexity of such tasks determines the precision and fre...
Danica Kragic, Lars Petersson, Henrik I. Christens...
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 1 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
PAMI
2007
123views more  PAMI 2007»
15 years 1 months ago
Unsupervised Statistical Segmentation of Nonstationary Images Using Triplet Markov Fields
—Recent developments in statistical theory and associated computational techniques have opened new avenues for image modeling as well as for image segmentation techniques. Thus, ...
Dalila Benboudjema, Wojciech Pieczynski
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
14 years 11 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
WKDD
2010
CPS
238views Data Mining» more  WKDD 2010»
14 years 11 months ago
3D Scientific Data Mining in Ion Trajectories
In physics, structure of glass and ion trajectories are essentially based on statistical analysis of data acquired through experimental measurement and computer simulation [1, 2]. ...
J. M. Sharif, M. Mahadi Abdul Jamil, Md. Asri Ngad...