Sciweavers

689 search results - page 49 / 138
» Metrics for more than two points at once
Sort
View
ICRA
2007
IEEE
122views Robotics» more  ICRA 2007»
15 years 4 months ago
Exploiting the Information at the Loop Closure in SLAM
— This paper presents two methods able to exploit the information at the loop closure in the SLAM problem. Both methods have three fundamental advantages. The first one is that ...
Agostino Martinelli, Roland Siegwart
SSDBM
2007
IEEE
111views Database» more  SSDBM 2007»
15 years 4 months ago
Duplicate Elimination in Space-partitioning Tree Indexes
Space-partitioning trees, like the disk-based trie, quadtree, kd-tree and their variants, are a family of access methods that index multi-dimensional objects. In the case of index...
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
MDM
2007
Springer
106views Communications» more  MDM 2007»
15 years 3 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
AIED
2005
Springer
15 years 3 months ago
Blending Assessment and Instructional Assisting
Middle school mathematics teachers are often forced to choose between assisting students' development and assessing students' abilities because of limited classroom time ...
Leena M. Razzaq, Mingyu Feng, Goss Nuzzo-Jones, Ne...
VLDB
2004
ACM
96views Database» more  VLDB 2004»
15 years 3 months ago
Answering XPath Queries over Networks by Sending Minimal Views
When a client submits a set of XPath queries to a XML database on a network, the set of answer sets sent back by the database may include redundancy in two ways: some elements may...
Keishi Tajima, Yoshiki Fukui