Sciweavers

1815 search results - page 211 / 363
» Cloud Computing: An Overview
Sort
View
76
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
ICRA
2009
IEEE
139views Robotics» more  ICRA 2009»
15 years 4 months ago
Laser-based navigation enhanced with 3D time-of-flight data
— Navigation and obstacle avoidance in robotics using planar laser scans has matured over the last decades. They basically enable robots to penetrate highly dynamic and populated...
Fang Yuan, Agnes Swadzba, Roland Philippsen, Orhan...
94
Voted
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
15 years 4 months ago
Comparison of surface normal estimation methods for range sensing applications
— As mobile robotics is gradually moving towards a level of semantic environment understanding, robust 3D object recognition plays an increasingly important role. One of the most...
Klaas Klasing, Daniel Althoff, Dirk Wollherr, Mart...
112
Voted
IROS
2009
IEEE
188views Robotics» more  IROS 2009»
15 years 4 months ago
Novelty detection and 3D shape retrieval based on Gaussian Mixture Models for autonomous surveillance robotics
Abstract— This paper describes an efficient method for retrieving the 3-dimensional shape associated to novelties in the environment of an autonomous robot, which is equipped wi...
Pedro Núñez Trujillo, Paulo Drews, R...
108
Voted
ISMAR
2009
IEEE
15 years 4 months ago
Mobile augmented reality based 3D snapshots
: In this paper, we present a mobile augmented reality application that is based on the acquisition of user-generated content obtained by 3D snapshotting. To take a 3D snapshot of ...
Peter Keitler, Frieder Pankratz, Björn Schwer...