Sciweavers

1050 search results - page 136 / 210
» Two methods of authenticated positioning
Sort
View
ATAL
2007
Springer
15 years 8 months ago
Eliciting single-peaked preferences using comparison queries
Voting is a general method for aggregating the preferences of multiple agents. Each agent ranks all the possible alternatives, and based on this, an aggregate ranking of the alter...
Vincent Conitzer
137
Voted
MVA
2007
230views Computer Vision» more  MVA 2007»
15 years 3 months ago
A Rear Vehicle Location Algorithm for Lane Change Assist
A monocular vision based location algorithm is presented to detect and track rear vehicles for lane change assist. The algorithm uses the shadow underneath the vehicle to extract ...
Wei Liu, Chunyan Song, Pengyu Fu, Nan Wang, Huai Y...
98
Voted
BMCBI
2008
176views more  BMCBI 2008»
15 years 2 months ago
H2r: Identification of evolutionary important residues by means of an entropy based analysis of multiple sequence alignments
Background: A multiple sequence alignment (MSA) generated for a protein can be used to characterise residues by means of a statistical analysis of single columns. In addition to t...
Rainer Merkl, Matthias Zwick
CORR
2010
Springer
115views Education» more  CORR 2010»
15 years 1 months ago
The complexity of solving reachability games using value and strategy iteration
Concurrent reachability games is a class of games heavily studied by the computer science community, in particular by the formal methods community. Two standard algorithms for app...
Kristoffer Arnsfelt Hansen, Rasmus Ibsen-Jensen, P...
IJRR
2006
123views more  IJRR 2006»
15 years 1 months ago
Hybrid Control of the Berkeley Lower Extremity Exoskeleton (BLEEX)
The first functional load-carrying and energetically autonomous exoskeleton was demonstrated at U.C. Berkeley, walking at the average speed of 0.9 m/s (2 mph) while carrying a 34 ...
Hami Kazerooni, Ryan Steger, Lihua Huang