Sciweavers

4340 search results - page 732 / 868
» Formal Methods and Cryptography
Sort
View
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
15 years 10 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
ICDAR
2005
IEEE
15 years 10 months ago
Text Degradations and OCR Training
Printing and scanning of text documents introduces degradations to the characters which can be modeled. Interestingly, certain combinations of the parameters that govern the degra...
Elisa H. Barney Smith, Tim L. Andersen
ICRA
2005
IEEE
111views Robotics» more  ICRA 2005»
15 years 10 months ago
Single-Query Entropy-Guided Path Planning
Motion planning for robots with many degrees of freedom requires the exploration of an exponentially large configuration space. Single-query motion planners restrict exploration ...
Brendan Burns, Oliver Brock
129
Voted
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 10 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...
ACMACE
2005
ACM
15 years 10 months ago
Towards a cinematically enhanced narrative
This paper describes the automatic creation of simple cinematic scenes and events that use film language (FL) as the basis for the creation of a visual story, aiming to improve it...
Alejandro Ramírez