Sciweavers

10674 search results - page 1939 / 2135
» The Virtual Environment - Another Approach
Sort
View
INFOSCALE
2007
ACM
15 years 6 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
AMW
2010
15 years 6 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
139
Voted
AVI
2010
15 years 6 months ago
Exploring the design space of multiscale 3D orientation
Recently, research in 3D computer graphics and interaction has started to move beyond the narrow domain of single object authoring and inspection, and has begun to consider comple...
James McCrae, Michael Glueck, Tovi Grossman, Azam ...
BILDMED
2008
176views Algorithms» more  BILDMED 2008»
15 years 6 months ago
Edge-Preserving Denoising for Segmentation in CT-images
In the clinical environment the segmentation of organs is an increasingly important application and used, for example, to restrict the perfusion analysis to a certain organ. In ord...
Eva Eibenberger, Anja Borsdorf, Andreas Wimmer, Jo...
DAGSTUHL
2007
15 years 6 months ago
Norms of Conversation in a Framework for Agent Communication Languages
Abstract. In open and heterogeneous environments offered by the Internet, where agents are designed by different vendors, the development of standards for agent communication nee...
Rodrigo Agerri
« Prev « First page 1939 / 2135 Last » Next »