Sciweavers

7434 search results - page 1444 / 1487
» Still
Sort
View
ICIP
2010
IEEE
14 years 9 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
ICRA
2010
IEEE
183views Robotics» more  ICRA 2010»
14 years 9 months ago
The Bielefeld anthropomorphic robot head "Flobi"
A robot's head is important both for directional sensors and, in human-directed robotics, as the single most visible interaction interface. However, designing a robot's h...
Ingo Lütkebohle, Frank Hegel, Simon Schulz, M...
ICTAC
2010
Springer
14 years 9 months ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett
IMC
2010
ACM
14 years 9 months ago
Comparing and improving current packet capturing solutions based on commodity hardware
Capturing network traffic with commodity hardware has become a feasible task: Advances in hardware as well as software have boosted off-the-shelf hardware to performance levels th...
Lothar Braun, Alexander Didebulidze, Nils Kammenhu...
INLG
2010
Springer
14 years 9 months ago
Charting the Potential of Description Logic for the Generation of Referring Expressions
The generation of referring expressions (GRE), an important subtask of Natural Language Generation (NLG) is to generate phrases that uniquely identify domain entities. Until recen...
Yuan Ren, Kees van Deemter, Jeff Z. Pan
« Prev « First page 1444 / 1487 Last » Next »