Sciweavers

57 search results - page 4 / 12
» Exploiting Symmetry in Protocol Testing
Sort
View
GECCO
2009
Springer
15 years 2 months ago
The sensitivity of HyperNEAT to different geometric representations of a problem
HyperNEAT, a generative encoding for evolving artificial neural networks (ANNs), has the unique and powerful ability to exploit the geometry of a problem (e.g., symmetries) by enc...
Jeff Clune, Charles Ofria, Robert T. Pennock
113
Voted
3DOR
2008
14 years 10 months ago
A 3D Face Recognition Algorithm Using Histogram-based Features
We present an automatic face recognition approach, which relies on the analysis of the three-dimensional facial surface. The proposed approach consists of two basic steps, namely ...
Xuebing Zhou, Helmut Seibert, Christoph Busch, Wol...
83
Voted
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
15 years 4 months ago
Symmetry-based face pose estimation from a single uncalibrated view
In this paper, a geometric method for estimating the face pose (roll and yaw angles) from a single uncalibrated view is presented. The symmetric structure of the human face is exp...
Vinod Pathangay, Sukhendu Das, Thomas Greiner
CAD
2005
Springer
14 years 9 months ago
Precise global collision detection in multi-axis NC-machining
We introduce a new approach to the problem of collision detection in multi-axis NC-machining. Due to the directional nature (tool axis) of multi-axis NCmachining, space subdivisio...
Oleg Ilushin, Gershon Elber, Dan Halperin, Ron Wei...
ISSA
2004
14 years 11 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche