Sciweavers

3604 search results - page 86 / 721
» All Common Subsequences
Sort
View
WISEC
2009
ACM
15 years 6 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
VL
2009
IEEE
187views Visual Languages» more  VL 2009»
15 years 6 months ago
Changing euler diagram properties by edge transformation of euler dual graphs
Euler diagrams form the basis of several visual modelling notations, including statecharts and constraint diagrams. Recently, various techniques for automated Euler diagram drawin...
John Howse, Peter Rodgers, Gem Stapleton
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
15 years 6 months ago
Robust servo-control for underwater robots using banks of visual filters
—We present an application of machine learning to the semi-automatic synthesis of robust servo-trackers for underwater robotics. In particular, we investigate an approach based o...
Junaed Sattar, Gregory Dudek
ICRA
2008
IEEE
125views Robotics» more  ICRA 2008»
15 years 6 months ago
Place recognition-based fixed-lag smoothing for environments with unreliable GPS
— Pose estimation of outdoor robots presents some distinct challenges due to the various uncertainties in the robot sensing and action. In particular, global positioning sensors ...
Roozbeh Mottaghi, Michael Kaess, Ananth Ranganatha...
AIHC
2007
Springer
15 years 6 months ago
Trajectory-Based Representation of Human Actions
This work addresses the problem of human action recognition by introducing a representation of a human action as a collection of short trajectories that are extracted in areas of ...
Antonios Oikonomopoulos, Ioannis Patras, Maja Pant...