Sciweavers

551 search results - page 26 / 111
» Preventing existence
Sort
View
DALT
2007
Springer
15 years 3 months ago
Composing High-Level Plans for Declarative Agent Programming
Abstract. Research on practical models of autonomous agents has largely focused on a procedural view of goal achievement. This allows for efficient implementations, but prevents an...
Felipe Rech Meneguzzi, Michael Luck
ICDCS
2006
IEEE
15 years 3 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
86
Voted
ACCV
2006
Springer
15 years 3 months ago
Minimal Weighted Local Variance as Edge Detector for Active Contour Models
Performing segmentation of narrow, elongated structures with low contrast boundaries is a challenging problem. Boundaries of these structures are difficult to be located when noise...
Max W. K. Law, Albert C. S. Chung
NETGAMES
2006
ACM
15 years 3 months ago
Hack-proof synchronization protocol for multi-player online games
Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages by essen...
Yeung Siu Fung
AVSS
2005
IEEE
15 years 3 months ago
Shape recognition based on a video and multi-sensor system
We present in this paper a real-time system for shape recognition. The proposed system is a video and multisensor platform that is able to classify the mobile objects evolving in ...
Huy-Binh Bui Ngoc, François Brémond,...