Sciweavers

1050 search results - page 96 / 210
» Two methods of authenticated positioning
Sort
View
NSPW
1998
ACM
15 years 6 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
ICRA
2000
IEEE
129views Robotics» more  ICRA 2000»
15 years 6 months ago
Data Association for Mobile Robot Navigation: A Graph Theoretic Approach
Data association is the process of relating features observed in the environment to features viewed previously or to features in a map. Correct feature association is essential fo...
Tim Bailey, Eduardo Mario Nebot, Julio Rosenblatt,...
ICCD
2003
IEEE
130views Hardware» more  ICCD 2003»
15 years 11 months ago
On Combining Pinpoint Test Set Relaxation and Run-Length Codes for Reducing Test Data Volume
This paper presents a pinpoint test set relaxation method for test compression that maximally derives the capability of a run-length encoding technique such as Golomb coding or fr...
Seiji Kajihara, Yasumi Doi, Lei Li, Krishnendu Cha...
3DPVT
2004
IEEE
183views Visualization» more  3DPVT 2004»
15 years 5 months ago
Projection Model, 3D Reconstruction and Rigid Motion Estimation from Non-Central Catadioptric Images
This paper addresses the problem of rigid motion estimation and 3D reconstruction in vision systems where it is possible to recover the incident light ray direction from the image...
Nuno Gonçalves, Helder Araújo
SCANGIS
2003
15 years 3 months ago
The Issue of Uncertainty Propagation in Spatial Decision Making
GISs give users facilities to integrate and analyze data from different sources with different scale, accuracy, resolution and quality of the original data which are the key aspect...
Rahim Ali. Abbaspour, Mahmoud Reza Delavar, Reihan...