Sciweavers

5153 search results - page 1023 / 1031
» Introduction to Randomized Algorithms
Sort
View
NETWORK
2007
234views more  NETWORK 2007»
14 years 9 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
PAMI
2007
185views more  PAMI 2007»
14 years 9 months ago
A Two-Level Generative Model for Cloth Representation and Shape from Shading
In this paper we present a two-level generative model for representing the images and surface depth maps of drapery and clothes. The upper level consists of a number of folds whic...
Feng Han, Song Chun Zhu
PAMI
2007
133views more  PAMI 2007»
14 years 9 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
CIKM
2010
Springer
14 years 8 months ago
Document allocation policies for selective searching of distributed indexes
Indexes for large collections are often divided into shards that are distributed across multiple computers and searched in parallel to provide rapid interactive search. Typically,...
Anagha Kulkarni, Jamie Callan
86
Voted
ICRA
2010
IEEE
202views Robotics» more  ICRA 2010»
14 years 8 months ago
A robust state estimation method against GNSS outage for unmanned miniature helicopters
Abstract— Most unmanned aerial robots use a Global Navigation Satellite System (GNSS), such as GPS, GLONASS, and Galileo, for their navigation. However, from time to time the GNS...
Tak-Kit Lau, Yun-hui Liu, Kai-wun Lin
« Prev « First page 1023 / 1031 Last » Next »