Sciweavers

8810 search results - page 1638 / 1762
» Openness
Sort
View
BLISS
2009
IEEE
15 years 5 months ago
Gait Recognition Using Shadow Analysis
The exploitation of biometrics information in human shadow silhouettes (shadow biometrics), derived from video imagery after processing by gait analysis methods opens new avenues ...
Yumi Iwashita, Adrian Stoica
BLISS
2009
IEEE
15 years 5 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
151
Voted
BIRTHDAY
2010
Springer
15 years 5 months ago
Choiceless Computation and Symmetry
Many natural problems in computer science concern structures like graphs where elements are not inherently ordered. In contrast, Turing machines and other common models of computa...
Benjamin Rossman
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 5 months ago
Stability analysis of linear hyperbolic systems with switching parameters and boundary conditions
Abstract— We study asymptotic stability of an infinite dimensional system that switches between a finite set of modes. Each mode is governed by a system of one-dimensional, lin...
Saurabh Amin, Falk M. Hante, Alexandre M. Bayen
CEC
2010
IEEE
15 years 5 months ago
Iterated local search vs. hyper-heuristics: Towards general-purpose search algorithms
An important challenge within hyper-heuristic research is to design search methodologies that work well, not only across different instances of the same problem, but also across di...
Edmund K. Burke, Timothy Curtois, Matthew R. Hyde,...
« Prev « First page 1638 / 1762 Last » Next »