Sciweavers

5948 search results - page 946 / 1190
» Computing Robust Counter-Strategies
Sort
View
136
Voted
CW
2004
IEEE
15 years 7 months ago
Barcode Readers using the Camera Device in Mobile Phones
This paper shows new algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones. The mobile phone system used here consists of a camera, mobil...
Eisaku Ohbuchi, Hiroshi Hanaizumi, Lim Ah Hock
CW
2004
IEEE
15 years 7 months ago
Peer-to-Peer Networked Field-type Virtual Environment by Using AtoZ
This paper aims to study how to gain the consistency of the state in a DVE (Distributed Virtual Environment) with lag, under the condition of peer-to-peer architecture. That is, w...
Tatsuhiro Yonekura, Yoshihiro Kawano, Dai Hanawa
DAC
2004
ACM
15 years 7 months ago
Statistical gate delay model considering multiple input switching
There is an increased dominance of intra-die process variations, creating a need for an accurate and fast statistical timing analysis. Most of the recent proposed approaches assum...
Aseem Agarwal, Florentin Dartu, David Blaauw
155
Voted
ENC
2004
IEEE
15 years 7 months ago
A Method Based on Genetic Algorithms and Fuzzy Logic to Induce Bayesian Networks
A method to induce bayesian networks from data to overcome some limitations of other learning algorithms is proposed. One of the main features of this method is a metric to evalua...
Manuel Martínez-Morales, Ramiro Garza-Dom&i...
CIVR
2006
Springer
129views Image Analysis» more  CIVR 2006»
15 years 7 months ago
Retrieving Objects Using Local Integral Invariants
The use of local features in computer vision has shown to be promising. Local features have several advantages including invariance to image transformations, independence of the ba...
Alaa Halawani, Hashem Tamimi