Sciweavers

5948 search results - page 922 / 1190
» Computing Robust Counter-Strategies
Sort
View
WACV
2005
IEEE
15 years 10 months ago
Planar Ego-Motion Without Correspondences
General structure-from-motion methods are not adept at dealing with constrained camera motions, even though such motions greatly simplify vision tasks like mobile robot localizati...
Ameesh Makadia, Dinkar Gupta, Kostas Daniilidis
ACMSE
2005
ACM
15 years 9 months ago
Reducing application code complexity with vocabulary-specific XML language bindings
The eXtensible Markup Language (XML) has become a ubiquitous data exchange and storage format. A variety of tools are available for incorporating XML-based data into applications....
Jules White, Boris Kolpackov, Balachandran Nataraj...
MINENET
2005
ACM
15 years 9 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
SAC
2005
ACM
15 years 9 months ago
Efficient placement and routing in grid-based networks
This paper presents an efficient technique for placement and routing of sensors/actuators and processing units in a grid network. Our system requires an extremely high level of ro...
Roozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid ...
ATAL
2005
Springer
15 years 9 months ago
Mechanism design and deliberative agents
The central mechanism design problem is to develop incentives for agents to truthfully reveal their preferences over different outcomes, so that the system-wide outcome chosen by ...
Kate Larson, Tuomas Sandholm