Sciweavers

1050 search results - page 189 / 210
» Two methods of authenticated positioning
Sort
View
TROB
2002
149views more  TROB 2002»
14 years 11 months ago
LOST: localization-space trails for robot teams
Abstract-We describe Localization-Space Trails (LOST), a method that enables a team of robots to navigate between places of interest in an initially unknown environment using a tra...
Richard T. Vaughan, Kasper Støy, Gaurav S. ...
BMCBI
2011
14 years 6 months ago
Flexible taxonomic assignment of ambiguous sequencing reads
Background: To characterize the diversity of bacterial populations in metagenomic studies, sequencing reads need to be accurately assigned to taxonomic units in a given reference ...
José Carlos Clemente, Jesper Jansson, Gabri...
PERVASIVE
2011
Springer
14 years 2 months ago
Recognizing Whether Sensors Are on the Same Body
As personal health sensors become ubiquitous, we also expect them to become interoperable. That is, instead of closed, end-to-end personal health sensing systems, we envision stand...
Cory Cornelius, David Kotz
GECCO
2007
Springer
160views Optimization» more  GECCO 2007»
15 years 5 months ago
Hill climbing on discrete HIFF: exploring the role of DNA transposition in long-term artificial evolution
We show how a random mutation hill climber that does multilevel selection utilizes transposition to escape local optima on the discrete Hierarchical-If-And-Only-If (HIFF) problem....
Susan Khor
101
Voted
CONCUR
2006
Springer
15 years 3 months ago
Sanity Checks in Formal Verification
One of the advantages of temporal-logic model-checking tools is their ability to accompany a negative answer to the correctness query by a counterexample to the satisfaction of the...
Orna Kupferman