Sciweavers

7623 search results - page 1354 / 1525
» Constructive Volume Modeling
Sort
View
134
Voted
JFR
2008
95views more  JFR 2008»
15 years 3 months ago
Maintaining network connectivity and performance in robot teams
In this paper, we present an experimental study of strategies for maintaining end-to-end communication links for tasks such as surveillance, reconnaissance, and target search and ...
M. Ani Hsieh, Anthony Cowley, Vijay Kumar, Camillo...
127
Voted
ISI
2006
Springer
15 years 3 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
124
Voted
IVS
2006
127views more  IVS 2006»
15 years 3 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
98
Voted
JAIR
2006
85views more  JAIR 2006»
15 years 3 months ago
Causes of Ineradicable Spurious Predictions in Qualitative Simulation
It was recently proved that a sound and complete qualitative simulator does not exist, that is, as long as the input-output vocabulary of the state-of-the-art QSIM algorithm is us...
Özgür Yilmaz, A. C. Cem Say
JCC
2006
82views more  JCC 2006»
15 years 3 months ago
Monte Carlo simulations of biomolecules: The MC module in CHARMM
: We describe the implementation of a general and flexible Monte Carlo (MC) module for the program CHARMM, which is used widely for modeling biomolecular systems with empirical ene...
Jie Hu, Ao Ma, Aaron R. Dinner
« Prev « First page 1354 / 1525 Last » Next »