Sciweavers

1050 search results - page 168 / 210
» Two methods of authenticated positioning
Sort
View
RAS
2000
170views more  RAS 2000»
15 years 1 months ago
Visual servoing and appearance for navigation
We address the problem of visual-based navigation of a mobile robot in indoors environments. The robot control system is based on a single camera to provide the required visual fe...
Raquel Frizera Vassallo, Hans J. Schneebeli, Jos&e...
ESE
1998
131views Database» more  ESE 1998»
15 years 1 months ago
A Comparison of Tool-Based and Paper-Based Software Inspection
Software inspection is an e ective method of defect detection. Recent research activity has considered the development of tool support to further increase the e ciency and e ectiv...
F. MacDonald, J. Miller
JCT
1998
68views more  JCT 1998»
15 years 1 months ago
Rook Theory and t-Cores
If t is a positive integer, then a partition of a non-negative integer n is a t−core if none of the hook numbers of the associated Ferrers-Young diagram is a multiple of t. These...
James Haglund, Ken Ono, Lawrence Sze
SIGIR
2002
ACM
15 years 1 months ago
Predicting query performance
We develop a method for predicting query performance by computing the relative entropy between a query language model and the corresponding collection language model. The resultin...
Stephen Cronen-Townsend, Yun Zhou, W. Bruce Croft
TSMC
1998
92views more  TSMC 1998»
15 years 1 months ago
Solving the orientation-duality problem for a circular feature in motion
Circular features have been commonly used in numerous computer vision application areas for 3-D pose estimation. However, the estimation of such a feature’s pose from 2-D image ...
D. He, Beno Benhabib