Sciweavers

2421 search results - page 208 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
248
Voted
ECOOP
2009
Springer
16 years 4 months ago
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis
Pointer analyses derived from a Context-Free-Language (CFL) reachability formulation achieve very high precision, but they do not scale well to compute the points-to solution for a...
Guoqing Xu, Atanas Rountev, Manu Sridharan
INFOCOM
2009
IEEE
15 years 10 months ago
Sensor Network Localization Using Sensor Perturbation
—Sensor network localization is an instance of the NP-HARD graph realization problem. Thus, methods used in practice are not guaranteed to find the correct localization, even if...
Yuanchen Zhu, Steven J. Gortler, Dylan Thurston
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
15 years 10 months ago
Human detection using multimodal and multidimensional features
— This paper presents a novel human detection method based on a Bayesian fusion approach using laser range data and camera images. Laser range data analysis groups data points wi...
Luciano Spinello, Roland Siegwart
ISSADS
2004
Springer
15 years 9 months ago
Evaluating Location Dependent Queries Using ISLANDS
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
Marie Thilliez, Thierry Delot
DAWAK
2001
Springer
15 years 8 months ago
Adaptable Similarity Search Using Vector Quantization
Adaptable similarity queries based on quadratic form distance functions are widely popular in data mining applications, particularly for domains such as multimedia, CAD, molecular ...
Christian Böhm, Hans-Peter Kriegel, Thomas Se...