Sciweavers

2680 search results - page 268 / 536
» The topology of the independence complex
Sort
View
79
Voted
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Detection of Variant Wipe Effects
Due to the diversity of different wipe effects, wipe transition is considered complex and difficult to detect. This paper identifies two common characteristics of different wipes,...
Shan Li, M. C. Lee
ICRA
2006
IEEE
150views Robotics» more  ICRA 2006»
15 years 7 months ago
An Approach to Visual Servoing based on Coded Light
— Positioning a robot with respect to objects by using data provided by a camera is a well known technique called visual servoing. In order to perform a task, the object must exh...
Jordi Pagès, Christophe Collewet, Fran&cced...
IEEEARES
2006
IEEE
15 years 7 months ago
An Architecture for Service Discovery Based on Capability Matching
Discovery of service providers that are useful to service requesters is a common problem in large, dynamic serviceoriented systems, such as Grids. Simple service indices do not ad...
Jaka Mocnik, Piotr Karwaczynski
SMA
2006
ACM
132views Solid Modeling» more  SMA 2006»
15 years 7 months ago
Generalized penetration depth computation
— We present an efficient algorithm to compute the generalized penetration depth (PDg) between rigid models. Given two overlapping objects, our algorithm attempts to compute the...
Liangjun Zhang, Young J. Kim, Gokul Varadhan, Dine...
CSMR
2005
IEEE
15 years 7 months ago
Tracing Cross-Cutting Requirements via Context-Based Constraints
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a ...
Felix Bübl, Michael Balser