Sciweavers

1518 search results - page 143 / 304
» Cryptographic Test Correction
Sort
View
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 10 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
GECCO
2009
Springer
15 years 10 months ago
Evolution of team composition in multi-agent systems
Evolution of multi-agent teams has been shown to be an effective method of solving complex problems involving the exploration of an unknown problem space. These autonomous and het...
Joshua Rubini, Robert B. Heckendorn, Terence Soule
127
Voted
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 10 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
RTSS
2008
IEEE
15 years 10 months ago
Schedulability and Compatibility of Real Time Asynchronous Objects
Abstract—We apply automata theory to specifying behavioral interfaces of objects and show how to check schedulability and compatibility of real time asynchronous objects. The beh...
Mohammad Mahdi Jaghoori, Delphine Longuet, Frank S...
AVSS
2007
IEEE
15 years 10 months ago
Sign language detection using 3D visual cues
A 3D visual hand gesture recognition method is proposed that detects correctly performed signs from stereo camera input. Hand tracking is based on skin detection with an adaptive ...
Jeroen Lichtenauer, Gineke A. ten Holt, Emile A. H...