Sciweavers

403 search results - page 12 / 81
» Plenoptic path and its applications
Sort
View
86
Voted
DBSEC
2003
113views Database» more  DBSEC 2003»
14 years 11 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
MCS
2009
Springer
15 years 4 months ago
True Path Rule Hierarchical Ensembles
Abstract. Hierarchical classification problems gained increasing attention within the machine learning community, and several methods for hierarchically structured taxonomies have...
Giorgio Valentini
HASE
2007
IEEE
15 years 4 months ago
SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths
SyncProbe improves the end-to-end predictability of distributed systems by providing applications with a real-time estimate of the maximum expected message delay (upper bound on c...
Jawwad Shamsi, Monica Brockmeyer
66
Voted
ICRA
1999
IEEE
130views Robotics» more  ICRA 1999»
15 years 1 months ago
EquiDistance Diagram: A New Roadmap Method for Path Planning
This paper introduces a novel heuristic nmdmap method for path planning, one that is inspired by the Vomnoi diagmm concept, but easiZy applicable to geneml configurntion spaces. T...
S. Sathiya Keerthi, Chong Jin Ong, Eugene Huang, E...
85
Voted
DGCI
2009
Springer
15 years 27 days ago
A Linear Time and Space Algorithm for Detecting Path Intersection
For discrete sets coded by the Freeman chain describing their contour, several linear algorithms have been designed for determining their shape properties. Most of them are based ...
Srecko Brlek, Michel Koskas, Xavier Provenç...