Sciweavers

2821 search results - page 502 / 565
» Tracing a single user
Sort
View
IROS
2008
IEEE
167views Robotics» more  IROS 2008»
15 years 6 months ago
Active rough shape estimation of unknown objects
— This paper presents a method to determine the rough shape of an object. This is a step in the development of a ”One Click Grasping Tool”, a grasping tool of everyday-life o...
Claire Dune, Éric Marchand, Christophe Coll...
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 6 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
AH
2008
Springer
15 years 6 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
98
Voted
AINA
2007
IEEE
15 years 6 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
NDSS
2007
IEEE
15 years 6 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith