Sciweavers

8468 search results - page 1528 / 1694
» The Technology of Data Stashing
Sort
View
102
Voted
ICEGOV
2007
ACM
15 years 2 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
90
Voted
BIOADIT
2006
Springer
15 years 2 months ago
Robot Control: From Silicon Circuitry to Cells
Life-like adaptive behaviour is so far an illusive goal in robot control. A capability to act successfully in a complex, ambiguous, and harsh environment would vastly increase the ...
Soichiro Tsuda, Klaus-Peter Zauner, Yukio-Pegio Gu...
98
Voted
CVPR
2000
IEEE
15 years 1 months ago
Detection of Obstacles in the Flight Path of an Aircraft
The National Aeronautics and Space Administration (NASA), along with members of the aircraft industry, recently developed technologies for a new supersonic aircraft. One of the te...
Tarak Gandhi, Mau-Tsuen Yang, Rangachar Kasturi, O...
ICCV
1995
IEEE
15 years 1 months ago
Recognizing 3D Objects Using Photometric Invariant
In this paper we describe a new e cient algorithm for recognizing 3D objects by combining photometric and geometric invariants. Some photometric properties are derived, that are i...
Kenji Nagao
116
Voted
SIGOPSE
1994
ACM
15 years 1 months ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle
« Prev « First page 1528 / 1694 Last » Next »