Sciweavers

5544 search results - page 892 / 1109
» Three Inadequate Models
Sort
View
127
Voted
MOBIMEDIA
2007
15 years 5 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
114
Voted
MVA
2007
132views Computer Vision» more  MVA 2007»
15 years 5 months ago
A Robust Coarse-to-Fine Method for Pupil Localization in Non-ideal Eye Images
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as i...
Xiaoyan Yuan, Pengfei Shi
144
Voted
RSS
2007
126views Robotics» more  RSS 2007»
15 years 5 months ago
Automatic Scheduling for Parallel Forward Dynamics Computation of Open Kinematic Chains
— Recent progress in the algorithm as well as the processor power have made the dynamics simulation of complex kinematic chains more realistic in various fields such as human mo...
Katsu Yamane, Yoshihiko Nakamura
102
Voted
USAB
2008
15 years 5 months ago
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger
130
Voted
AAAI
2004
15 years 5 months ago
Effective Approaches for Partial Satisfaction (Over-Subscription) Planning
In many real world planning scenarios, agents often do not have enough resources to achieve all of their goals. Consequently, they are forced to find plans that satisfy only a sub...
Menkes van den Briel, Romeo Sanchez Nigenda, Minh ...