Sciweavers

7195 search results - page 1227 / 1439
» On Computing Power
Sort
View
143
Voted
AROBOTS
1999
140views more  AROBOTS 1999»
15 years 4 months ago
A Robust Analog VLSI Motion Sensor Based on the Visual System of the Fly
Sensing visual motion gives a creature valuable information about its interactions with the environment. Flies in particular use visual motion information to navigate through turbu...
Reid R. Harrison, Christof Koch
129
Voted
KBS
2002
88views more  KBS 2002»
15 years 4 months ago
Mining the optimal class association rule set
We define an optimal class association rule set to be the minimum rule set with the same predictive power of the complete class association rule set. Using this rule set instead o...
Jiuyong Li, Hong Shen, Rodney W. Topor
PRL
2002
142views more  PRL 2002»
15 years 4 months ago
Matching of palmprints
This paper investigates the feasibility of person identification based on feature points extracted from palmprint images. Our approach first extracts a set of feature points along...
Nicolae Duta, Anil K. Jain, Kanti V. Mardia
SIAMDM
2002
124views more  SIAMDM 2002»
15 years 4 months ago
Counting Claw-Free Cubic Graphs
Let Hn be the number of claw-free cubic graphs on 2n labeled nodes. Combinatorial reductions are used to derive a second order, linear homogeneous differential equation with polyno...
Edgar M. Palmer, Ronald C. Read, Robert W. Robinso...
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 4 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
« Prev « First page 1227 / 1439 Last » Next »