Sciweavers

893 search results - page 71 / 179
» Descent Theory for Schemes
Sort
View
GLOBECOM
2008
IEEE
15 years 6 months ago
Approaching the Capacity of Wireless Networks through Distributed Interference Alignment
Abstract— Recent results establish the optimality of interference alignment to approach the Shannon capacity of interference networks at high SNR. However, the extent to which in...
Krishna Srikanth Gomadam, Viveck R. Cadambe, Syed ...
ACCV
2007
Springer
15 years 6 months ago
Backward Segmentation and Region Fitting for Geometrical Visibility Range Estimation
Abstract. We present a new application of computer vision: continuous measurement of the geometrical visibility range on inter-urban roads, solely based on a monocular image acquis...
Erwan Bigorgne, Jean-Philippe Tarel
DSSCV
2005
Springer
15 years 5 months ago
Using Top-Points as Interest Points for Image Matching
We consider the use of so-called top-points for object retrieval. These points are based on scale-space and catastrophe theory, and are invariant under gray value scaling and offse...
Bram Platel, Evguenia Balmachnova, Luc Florack, Fr...
CCS
2004
ACM
15 years 5 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
ICRA
2002
IEEE
141views Robotics» more  ICRA 2002»
15 years 4 months ago
Pseudoinverse Trajectory Control of Redundant Manipulators: A Fractional Calculus Perspective
Abstract— Redundant manipulators have some advantages when compared with classical arms because they allow the trajectory optimization, both on the free space and on the presence...
Fernando B. M. Duarte, José António ...