Sciweavers

1086 search results - page 139 / 218
» Points surrounding the origin
Sort
View
118
Voted
TEI
2010
ACM
257views Hardware» more  TEI 2010»
15 years 8 months ago
Traditional games meet ICT: a case study on go game augmentation
While pervasive technologies explore new gaming styles, traditional games, such as cards and tabletop games are still appealing and have various irreplaceable flavors. We point ou...
Takahiro Iwata, Tetsuo Yamabe, Mikko Polojärv...
ICDAR
2009
IEEE
15 years 8 months ago
A Modified Adaptive Logical Level Binarization Technique for Historical Document Images
In this paper, a new document image binarization technique is presented, as an improved version of the state-of-the-art adaptive logical level technique (ALLT). The original ALLT ...
Konstantinos Ntirogiannis, Basilios Gatos, Ioannis...
INFOCOM
2009
IEEE
15 years 8 months ago
Tracking with Unreliable Node Sequences
—Tracking mobile targets using sensor networks is a challenging task because of the impacts of in-the-filed factors such as environment noise, sensing irregularity and etc. This...
Ziguo Zhong, Ting Zhu, Dan Wang, Tian He
INFOCOM
2009
IEEE
15 years 8 months ago
CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks
Abstract—Many sensor network applications are tightly coupled with the geometric environment where the sensor nodes are deployed. The topological skeleton extraction has shown gr...
Hongbo Jiang, Wenping Liu, Dan Wang, Chen Tian, Xi...
FSTTCS
2009
Springer
15 years 8 months ago
Iterative Methods in Combinatorial Optimization
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
R. Ravi