Sciweavers

11394 search results - page 2115 / 2279
» Error-Correcting Data Structures
Sort
View
FGR
2008
IEEE
232views Biometrics» more  FGR 2008»
15 years 10 months ago
3D face recognition from multiple images: A shape-from-motion approach
In this article we explore the use of methodologies for 3D reconstruction from multiple images to recognize faces. We try to devise a strategy to tackle the problem of recognizing...
Manuel Marques, João Costeira
155
Voted
CEC
2007
IEEE
15 years 10 months ago
MRI brain image segmentation by fuzzy symmetry based genetic clustering technique
—In this paper, an automatic segmentation technique of multispectral magnetic resonance image of the brain using a new fuzzy point symmetry based genetic clustering technique is ...
Sriparna Saha, Sanghamitra Bandyopadhyay
ICC
2007
IEEE
239views Communications» more  ICC 2007»
15 years 10 months ago
Measuring WCDMA and HSDPA Delay Characteristics with QoSMeT
—Quality of Service (QoS) is becoming increasingly important with the rise of multimedia applications (e.g., voice over IP (VoIP), video conferencing, online gaming, and Internet...
Jarmo Prokkola, Mikko Hanski, Marko Jurvansuu, Mil...
133
Voted
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
15 years 10 months ago
Remote Low Frequency State Feedback Kinematic Motion Control for Mobile Robot Trajectory Tracking
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Daniel Montrallo Flickinger, Mark A. Minor
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 10 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
« Prev « First page 2115 / 2279 Last » Next »