Sciweavers

777 search results - page 57 / 156
» presence 2010
Sort
View
99
Voted
ECEASST
2010
14 years 10 months ago
Integrating Data from Multiple Repositories to Analyze Patterns of Contribution in FOSS Projects
: The majority of Free and Open Source Software (FOSS) developers are mobile and often use different identities in the projects or communities they participate in. These characteri...
Sulayman K. Sowe, Antonio Cerone
130
Voted
ACCV
2010
Springer
14 years 7 months ago
An Efficient RANSAC for 3D Object Recognition in Noisy and Occluded Scenes
In this paper, we present an efficient algorithm for 3D object recognition in presence of clutter and occlusions in noisy, sparse and unsegmented range data. The method uses a robu...
Chavdar Papazov, Darius Burschka
79
Voted
CDC
2010
IEEE
143views Control Systems» more  CDC 2010»
14 years 7 months ago
Trajectory tracking control for a tele-operation setup with disturbance estimation and compensation
In this paper, we tackle the position tracking problem in a robotic tele-operation setup in the presence of perturbations. In order to cope with the disturbance we developed a new ...
Stefan Lichiardopol, Nathan van de Wouw, Dragan Ko...
107
Voted
CDC
2010
IEEE
130views Control Systems» more  CDC 2010»
14 years 7 months ago
Backstepping control design for motion coordination of self-propelled vehicles
Motion coordination of autonomous vehicles has applications from target surveillance to climate monitoring. Previous research has yielded stabilizing control laws for a selfpropell...
Rochelle Mellish, Derek A. Paley
IFIP
2010
Springer
14 years 7 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...