Sciweavers

5948 search results - page 1131 / 1190
» Computing Robust Counter-Strategies
Sort
View
GI
2009
Springer
15 years 2 months ago
Barcode Application Innovation for Smartphones
: Modern smartphones provide a high sophisticated camera and a high resolution display. Therefore, they can be used to enable various application scenarios for 1D and 2D barcode re...
Gerald Eichler, Karl-Heinz Lüke, Aykan Aydin,...
ICCS
2001
Springer
15 years 2 months ago
An Application of the Process Mechanism to a Room Allocation Problem Using the pCG Language
The Sisyphus-I initiative consists of a constraint satisfaction problem in which a group of people in a research environment must be allocated rooms. Numerous constraints are detai...
David Benn, Dan Corbett
ASM
2000
ASM
15 years 2 months ago
Report on a Practical Application of ASMs in Software Design
ASMs have been used at Siemens Corporate Technology to design a component in a software package called FALKO. Main purpose of FALKO is the construction and validation of timetables...
Egon Börger, Peter Päppinghaus, Joachim ...
ECCV
2010
Springer
15 years 2 months ago
Discriminative Mixture-of-Templates for Viewpoint Classification
Abstract. Object viewpoint classification aims at predicting an approximate 3D pose of objects in a scene and is receiving increasing attention. State-of-the-art approaches to view...
DNA
2000
Springer
132views Bioinformatics» more  DNA 2000»
15 years 2 months ago
Engineered Communications for Microbial Robotics
Multicellular organisms create complex patterned structures from identical, unreliable components. Learning how to engineer such robust behavior is important to both an improved un...
Ron Weiss, Thomas F. Knight Jr.
« Prev « First page 1131 / 1190 Last » Next »