Sciweavers

5948 search results - page 924 / 1190
» Computing Robust Counter-Strategies
Sort
View
HUC
2005
Springer
15 years 9 months ago
Scanning Objects in the Wild: Assessing an Object Triggered Information System
We describe the results of a field deployment of the AURA system which links online content to physical objects through machine readable tags. AURA runs on commercially available p...
A. J. Bernheim Brush, Tammara Combs Turner, Marc A...
ICCS
2005
Springer
15 years 9 months ago
SWAT: A New Spliced Alignment Tool Tailored for Handling More Sequencing Errors
Abstract. There are several computer programs that align mRNA with its genomic counterpart to determine exon boundaries. Though most of these programs perform such alignment effici...
Yifeng Li, Hesham H. Ali
LOCA
2005
Springer
15 years 9 months ago
Context Modelling and Management in Ambient-Aware Pervasive Environments
Services in pervasive computing systems must evolve so that they become minimally intrusive and exhibit inherent proactiveness and dynamic adaptability to the current conditions, u...
Maria Strimpakou, Ioanna Roussaki, Carsten Pils, M...
VLSM
2005
Springer
15 years 9 months ago
A Surface Reconstruction Method for Highly Noisy Point Clouds
In this paper we propose a surface reconstruction method for highly noisy and non-uniform data based on minimal surface model and tensor voting method. To deal with ill-posedness, ...
DanFeng Lu, HongKai Zhao, Ming Jiang 0001, ShuLin ...
ACMSE
2004
ACM
15 years 9 months ago
Distributed robotic target acquisition using Bluetooth communication
This paper presents a distributed multi-robot system designed to solve a team-based search and destroy task. The project was divided into two phases. The initial phase was used to...
J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, ...