Sciweavers

144227 search results - page 145 / 28846
» Using
Sort
View
103
Voted
ACMIDC
2009
15 years 6 months ago
Ten design lessons from the literature on child development and children's use of technology
The existing knowledge base on child development offers a wealth of information that can be useful for the design of children's technology. Furthermore, academic journals and...
Helene Gelderblom, Paula Kotzé
GBRPR
2007
Springer
15 years 6 months ago
Image Classification Using Marginalized Kernels for Graphs
We propose in this article an image classification technique based on kernel methods and graphs. Our work explores the possibility of applying marginalized kernels to image process...
Emanuel Aldea, Jamal Atif, Isabelle Bloch
139
Voted
AINA
2004
IEEE
15 years 6 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
129
Voted
APNOMS
2006
Springer
15 years 6 months ago
Network-Adaptive QoS Routing Using Local Information
In this paper, we propose the localized adaptive QoS routing scheme using POMDP(partially observable Markov Decision Processes) and Exploration Bonus. In order to deal with POMDP p...
Jeongsoo Han
96
Voted
AUSAI
2006
Springer
15 years 6 months ago
Studies on Motion Control of a Modular Robot Using Cellular Automata
Abstract. In this paper we report preliminary findings of using cellular automata (CA) as an underlying architecture in controlling the motion of a fivelegged brittle star typed ro...
Sunil Pranit Lal, Koji Yamada, Satoshi Endo
« Prev « First page 145 / 28846 Last » Next »