Sciweavers

2663 search results - page 149 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
IAW
2003
IEEE
15 years 3 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
ELPUB
1999
ACM
15 years 2 months ago
Project Runeberg's Electronic Facsimile Editions of Nordic Literature
Project Runeberg has been publishing Nordic literature on the Internet since 1992. The project is based at Linköping University, Sweden. In the fall of 1998 a series of experimen...
Lars Aronsson
LREC
2010
121views Education» more  LREC 2010»
14 years 11 months ago
ELRA's Services 15 Years on...Sharing and Anticipating the Community
15 years have gone by and ELRA continues embracing the needs of the HLT community to design its services and to implement them through its operational body, ELDA. The needs of the...
Victoria Arranz, Khalid Choukri
SSWMC
2004
14 years 11 months ago
Biometric verification based on grip-pattern recognition
This paper describes the design, implementation and evaluation of a user-verification system for a smart gun, which is based on grip-pattern recognition. An existing pressure sens...
Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. K...
CORR
2008
Springer
81views Education» more  CORR 2008»
14 years 10 months ago
Kinematic Analysis of the vertebra of an eel like robot
The kinematic analysis of a spherical wrist with parallel architecture is the object of this article. This study is part of a larger French project, which aims to design and to bu...
Damien Chablat