Sciweavers

1202 search results - page 129 / 241
» Robust system multiangulation using subspace methods
Sort
View
158
Voted
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
15 years 4 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
111
Voted
IROS
2009
IEEE
117views Robotics» more  IROS 2009»
15 years 9 months ago
Joint calibration of multiple sensors
— Many calibration methods calibrate a pair of sensors at a time. For robotic systems with many sensors, they are often time-consuming to use, and can also lead to inaccurate res...
Quoc V. Le, Andrew Y. Ng
107
Voted
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
15 years 2 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
164
Voted
ICIP
2005
IEEE
16 years 4 months ago
Shape space sampling distributions and their impact on visual tracking
Object motions can be represented as a sequence of shape deformations and translations which can be interpretated as a sequence of points in N-dimensional shape space. These space...
Amit Kale, Christopher O. Jaynes
96
Voted
DSN
2005
IEEE
15 years 8 months ago
Model-Based Failure Analysis of Journaling File Systems
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...