Sciweavers

8468 search results - page 1604 / 1694
» The Technology of Data Stashing
Sort
View
ICB
2009
Springer
183views Biometrics» more  ICB 2009»
15 years 4 months ago
Overview of the Multiple Biometrics Grand Challenge
The goal of the Multiple Biometrics Grand Challenge (MBGC) is to improve the performance of face and iris recognition technology from biometric samples acquired under unconstrained...
P. Jonathon Phillips, Patrick J. Flynn, J. Ross Be...
ISMM
2009
Springer
15 years 4 months ago
Discrete Driver Assistance
Applying computer technology, such as computer vision in driver assistance, implies that processes and data are modeled as being discretized rather than being continuous. The area ...
Reinhard Klette, Ruyi Jiang, Sandino Morales, Tobi...
LOCA
2009
Springer
15 years 4 months ago
Error Estimation for Indoor 802.11 Location Fingerprinting
802.11-based indoor positioning systems have been under research for quite some time now. However, despite the large attention this topic has gained, most of the research focused o...
Hendrik Lemelson, Mikkel Baun Kjærgaard, Ren...
LPNMR
2009
Springer
15 years 4 months ago
Application of ASP for Automatic Synthesis of Flexible Multiprocessor Systems from Parallel Programs
Configurable on chip multiprocessor systems combine advantages of task-level parallelism and the flexibility of field-programmable devices to customize architectures for paralle...
Harold Ishebabi, Philipp Mahr, Christophe Bobda, M...
MIDDLEWARE
2009
Springer
15 years 4 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...
« Prev « First page 1604 / 1694 Last » Next »