Sciweavers

5864 search results - page 166 / 1173
» Can We Work around Numerical Methods
Sort
View
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
14 years 11 months ago
A distributed Newton method for Network Utility Maximization
Most existing work uses dual decomposition and subgradient methods to solve Network Utility Maximization (NUM) problems in a distributed manner, which suffer from slow rate of con...
Ermin Wei, Asuman E. Ozdaglar, Ali Jadbabaie
ICRA
2008
IEEE
186views Robotics» more  ICRA 2008»
15 years 11 months ago
Analysis of classical and new visual servoing control laws
Abstract— In this paper, we analyze and compare five imagebased visual servoing control laws. Three of them are classical while two new ones are proposed. The first new control...
Mohammed Marey, François Chaumette
ICPR
2008
IEEE
15 years 11 months ago
Topological structure-based alignment for fingerprint Fuzzy Vault
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric crypt...
Jianjie Li, Xin Yang, Jie Tian, Peng Shi, Peng Li
CVPR
2004
IEEE
16 years 6 months ago
Learning Object Detection from a Small Number of Examples: The Importance of Good Features
Face detection systems have recently achieved high detection rates[11, 8, 5] and real-time performance[11]. However, these methods usually rely on a huge training database (around...
Kobi Levi, Yair Weiss
ICSE
2001
IEEE-ACM
15 years 9 months ago
A Web-Oriented Architectural Aspect for the Emerging Computational Tapestry
An emerging tapestry of computations will soon integrate systems around the globe. It will evolve without central control. Its complexity will be vast. We need new ideas, tools an...
Kevin J. Sullivan, Avneesh Saxena