Sciweavers

4529 search results - page 65 / 906
» Position Based Cryptography
Sort
View
88
Voted
CRIWG
2003
15 years 4 months ago
Collaborative Scenarios to Promote Positive Interdependence among Group Members
Positive interdependence is the heart of collaborative activities that define collaboration and transform group work into teamwork. To achieve positive interdependence among studen...
César A. Collazos, Luis A. Guerrero, Jos&ea...
CAGD
2000
53views more  CAGD 2000»
15 years 2 months ago
Multi-point tool positioning strategy for 5-axis mashining of sculptured surfaces
Multi-point machining (MPM) is a tool positioning technique used for finish machining of sculptured surfaces. In this technique the desired surface is generated at more than one p...
Andrew Warkentin, Fathy Ismail, Sanjeev Bedi
PSD
2004
Springer
79views Database» more  PSD 2004»
15 years 8 months ago
A Fast Network Flows Heuristic for Cell Suppression in Positive Tables
Abstract. Current network flows heuristics for cell suppression in positive tables (i.e, cell values are greater or equal than zero) rely on the solution of several minimum-cost s...
Jordi Castro
133
Voted
CIMCA
2006
IEEE
15 years 8 months ago
Sensibility Control of Redundant Robots: Position Control by Image Trajectories
This work is dedicated to position control of redundant robots, realized with the help of the sensibility theory. The control method allows controlling the robot position followin...
G. Boiadjiev, D. Vassileva, Haruhisa Kawasaki, Tet...
117
Voted
CRV
2006
IEEE
101views Robotics» more  CRV 2006»
15 years 8 months ago
Urban Position Estimation from One Dimensional Visual Cues
We consider the problem of vision-based position estimation in urban environments. In particular, we are interested in position estimation from visual cues, but using only limited...
Derek Johns, Gregory Dudek