Sciweavers

5153 search results - page 682 / 1031
» Introduction to Randomized Algorithms
Sort
View
SAT
2007
Springer
99views Hardware» more  SAT 2007»
15 years 10 months ago
Horn Upper Bounds and Renaming
Abstract. We consider the problem of computing tractable approximations to CNF formulas, extending the approach of Selman and Kautz to compute the Horn-LUB to involve renaming of v...
Marina Langlois, Robert H. Sloan, György Tur&...
144
Voted
3DPVT
2006
IEEE
176views Visualization» more  3DPVT 2006»
15 years 10 months ago
Belief Propagation for Panorama Generation
We present an algorithm for generating panoramic images of complex scenes from a multi-sensor camera. We further present a programmable graphics hardware implementation to process...
Alan Brunton, Chang Shu
ICRA
2006
IEEE
70views Robotics» more  ICRA 2006»
15 years 10 months ago
Pushing using Compliance
— This paper addresses the problem of maneuvering an object by pushing it through an environment with obstacles. Instead of only pushing the object through open spaces, we also a...
Dennis Nieuwenhuisen, A. Frank van der Stappen, Ma...
ISCAS
2006
IEEE
116views Hardware» more  ISCAS 2006»
15 years 10 months ago
Wavelet based detection of moving tree branches and leaves in video
—A method for detection of tree branches and leaves in video is proposed. It is observed that the motion vectors of tree branches and leaves exhibit random motion. On the other h...
B. Ugur Töreyin, A. Enis Çetin
LCN
2006
IEEE
15 years 10 months ago
Content-based Packet Marking for Application-Aware Processing in Overlay Networks
: In many emerging sensing applications, random network losses may lead to drop of critical information, rendering partially received data useless for the end users. A packet-marki...
Panho Lee, Tarun Banka, Anura P. Jayasumana, V. Ch...