Sciweavers

291 search results - page 15 / 59
» Enforceable social laws
Sort
View
102
Voted
IJRR
2011
109views more  IJRR 2011»
14 years 4 months ago
Planning and control for cooperative manipulation and transportation with aerial robots
We consider the problem of controlling multiple robots manipulating and transporting a payload in three dimensions via cables. Individual robot control laws and motion plans enable...
Jonathan Fink, Nathan Michael, Soonkyum Kim, Vijay...
ICB
2009
Springer
142views Biometrics» more  ICB 2009»
15 years 4 months ago
Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints
Law enforcement agencies routinely collect both rolled and plain fingerprints of all the ten fingers of suspects. These two types of fingerprints complement each other, since ro...
Jianjiang Feng, Soweon Yoon, Anil K. Jain
ISI
2005
Springer
15 years 3 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
DI
2006
52views more  DI 2006»
14 years 9 months ago
Unique file identification in the National Software Reference Library
: The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for use by law enforcement and other organizations invo...
Steve Mead
DRM
2005
Springer
15 years 3 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison