Sciweavers

5550 search results - page 1108 / 1110
» Different Approaches to Proof Systems
Sort
View
JMIV
1998
106views more  JMIV 1998»
14 years 9 months ago
Linear Scale-Space Theory from Physical Principles
In the past decades linear scale-space theory was derived on the basis of various axiomatics. In this paper we revisit these axioms and show that they merely coincide with the foll...
Alfons H. Salden, Bart M. ter Haar Romeny, Max A. ...
MICRO
2002
IEEE
156views Hardware» more  MICRO 2002»
14 years 9 months ago
TCP Switching: Exposing Circuits to IP
There has been much discussion about the best way to combine the benefits of new optical circuit switching technology with the established packet switched Internet. In this paper,...
Pablo Molinero-Fernández, Nick McKeown
TSMC
2008
182views more  TSMC 2008»
14 years 9 months ago
Incremental Linear Discriminant Analysis for Face Recognition
Abstract--Dimensionality reduction methods have been successfully employed for face recognition. Among the various dimensionality reduction algorithms, linear (Fisher) discriminant...
Haitao Zhao, Pong Chi Yuen
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
14 years 8 months ago
Rao-Blackwellized particle filtering for probing-based 6-DOF localization in robotic assembly
This paper presents a probing-based method for probabilistic localization in automated robotic assembly. We consider peg-in-hole problems in which a needle-like peg has a single p...
Yuichi Taguchi, Tim K. Marks, Haruhisa Okuda
ACSAC
2010
IEEE
14 years 8 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
« Prev « First page 1108 / 1110 Last » Next »