Sciweavers

1648 search results - page 262 / 330
» Structuring namespace descriptions
Sort
View
108
Voted
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
15 years 7 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
ICCV
1998
IEEE
15 years 7 months ago
Integrated Surface, Curve and Junction Inference from Sparse 3-D Data Sets
We areinterestedin descriptionsof 3-D data sets,as obtained from stereoor a 3-D digitizer. We thereforeconsideras inputa sparsesetof points, possibly associated with certain orien...
Chi-Keung Tang, Gérard G. Medioni
165
Voted
ISORC
1998
IEEE
15 years 7 months ago
Specification of Real-Time Interaction Constraints
We present a coordination language and its semantics for specification and implementation of object-oriented realtime systems. Real-time systems operate under real-time constraint...
Brian Nielsen, Shangping Ren, Gul Agha
148
Voted
EPS
1998
Springer
15 years 7 months ago
Complete Classes of Strategies for the Classical Iterated Prisoner's Dilemma
The Classical Iterated Prisoner's Dilemma (CIPD) is used to study the evolution of cooperation. We show, with a genetic approach, how basic ideas could be used in order to gen...
Bruno Beaufils, Jean-Paul Delahaye, Philippe Mathi...
118
Voted
SIGCOMM
1997
ACM
15 years 7 months ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo