Sciweavers

1202 search results - page 129 / 241
» Robust system multiangulation using subspace methods
Sort
View
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
14 years 11 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
IROS
2009
IEEE
117views Robotics» more  IROS 2009»
15 years 4 months ago
Joint calibration of multiple sensors
— Many calibration methods calibrate a pair of sensors at a time. For robotic systems with many sensors, they are often time-consuming to use, and can also lead to inaccurate res...
Quoc V. Le, Andrew Y. Ng
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
14 years 9 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
ICIP
2005
IEEE
15 years 11 months ago
Shape space sampling distributions and their impact on visual tracking
Object motions can be represented as a sequence of shape deformations and translations which can be interpretated as a sequence of points in N-dimensional shape space. These space...
Amit Kale, Christopher O. Jaynes
DSN
2005
IEEE
15 years 3 months ago
Model-Based Failure Analysis of Journaling File Systems
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...