Sciweavers

57 search results - page 4 / 12
» Exploiting Symmetry in Protocol Testing
Sort
View
GECCO
2009
Springer
15 years 7 months ago
The sensitivity of HyperNEAT to different geometric representations of a problem
HyperNEAT, a generative encoding for evolving artificial neural networks (ANNs), has the unique and powerful ability to exploit the geometry of a problem (e.g., symmetries) by enc...
Jeff Clune, Charles Ofria, Robert T. Pennock
3DOR
2008
15 years 4 months ago
A 3D Face Recognition Algorithm Using Histogram-based Features
We present an automatic face recognition approach, which relies on the analysis of the three-dimensional facial surface. The proposed approach consists of two basic steps, namely ...
Xuebing Zhou, Helmut Seibert, Christoph Busch, Wol...
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
15 years 9 months ago
Symmetry-based face pose estimation from a single uncalibrated view
In this paper, a geometric method for estimating the face pose (roll and yaw angles) from a single uncalibrated view is presented. The symmetric structure of the human face is exp...
Vinod Pathangay, Sukhendu Das, Thomas Greiner
CAD
2005
Springer
15 years 3 months ago
Precise global collision detection in multi-axis NC-machining
We introduce a new approach to the problem of collision detection in multi-axis NC-machining. Due to the directional nature (tool axis) of multi-axis NCmachining, space subdivisio...
Oleg Ilushin, Gershon Elber, Dan Halperin, Ron Wei...
ISSA
2004
15 years 4 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche