Sciweavers

7326 search results - page 1424 / 1466
» Methods for modalities 3
Sort
View
ICASSP
2010
IEEE
15 years 12 hour ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
MOBISYS
2010
ACM
15 years 2 months ago
MAUI: making smartphones last longer with code offload
This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily...
Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho,...
AAMAS
2010
Springer
14 years 12 months ago
Evolutionary mechanism design: a review
Abstract The advent of large-scale distributed systems poses unique engineering challenges. In open systems such as the internet it is not possible to prescribe the behaviour of al...
Steve Phelps, Peter McBurney, Simon Parsons
AMC
2007
92views more  AMC 2007»
14 years 12 months ago
An integrated framework for continuous assessment and improvement of manufacturing systems
This paper presents an integrated framework for assessment and ranking of manufacturing systems based on management and organizational performance indicators. The integrated appro...
Ali Azadeh, S. F. Ghaderi, Y. Partovi Miran, V. Eb...
AML
2008
124views more  AML 2008»
14 years 12 months ago
The elementary computable functions over the real numbers: applying two new techniques
The basic motivation behind this work is to tie together various computational complexity classes, whether over different domains such as the naturals or the reals, or whether def...
Manuel Lameiras Campagnolo, Kerry Ojakian
« Prev « First page 1424 / 1466 Last » Next »