Sciweavers

1050 search results - page 169 / 210
» Two methods of authenticated positioning
Sort
View
IJRR
2010
130views more  IJRR 2010»
15 years 6 days ago
CAD Model-based Tracking and 3D Visual-based Control for MEMS Microassembly
This paper investigates sequential robotic microassembly for the construction of 3D micro-electro-mechanical systems (MEMS) structures using a 3D visual servoing approach. The pre...
Brahim Tamadazte, Éric Marchand, Sounkalo D...
GAMEON
2009
14 years 11 months ago
Analysis of User Trajectories Based on Data Distribution and State Transition: a Case Study with a Massively Multiplayer Online
At present, trajectory data, series of coordinate data traversed by moving objects, can be readily obtained due to the advent of positioning technologies. Clustering of trajectori...
Ruck Thawonmas, Junichi Oda, Kuan-Ta Chen
IEEEIAS
2009
IEEE
14 years 11 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
CVPR
2011
IEEE
14 years 10 months ago
Multiview Registration via Graph Diffusion of Dual Quaternions
Surface registration is a fundamental step in the reconstruction of three-dimensional objects. While there are several fast and reliable methods to align two surfaces, the tools a...
Andrea Torsello, Emanuele Rodola, Andrea Albarelli
SYNTHESE
2011
77views more  SYNTHESE 2011»
14 years 8 months ago
E. W. Beth as a philosopher of physics
This paper examines E. W. Beth’s work in the philosophy of physics, both from a historical and a systematic point of view. Beth saw the philosophy of physics first of all as an ...
Dennis Dieks