Sciweavers

956 search results - page 86 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
137
Voted
CORR
2010
Springer
238views Education» more  CORR 2010»
15 years 2 months ago
Face Identification by SIFT-based Complete Graph Topology
This paper presents a new face identification system based on Graph Matching Technique on SIFT features extracted from face images. Although SIFT features have been successfully us...
Dakshina Ranjan Kisku, Ajita Rattani, Enrico Gross...
116
Voted
WISES
2003
15 years 4 months ago
Adding Hard Real-time Capabilities to CORBA
Abstract — Control systems are often software-intensive applications that are becoming extremely complex as new functionality is required. Complexity is a real engineering challe...
Thomas Losert
143
Voted
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 2 months ago
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
Kam-yiu Lam, Alan Kwan, Krithi Ramamritham
117
Voted
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
15 years 8 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
97
Voted
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
15 years 8 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum