Sciweavers

3979 search results - page 43 / 796
» Wild control operators
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
EATIS
2007
ACM
15 years 1 months ago
Use of web service orchestration strategies in operations on digital democracy platform
Platforms of digital democracy, including both those in platforms of e-government and those operating independently, provide a channel of citizen participation enabling democratic...
Carlos González Martínez, Emilia P&e...
AAAI
1990
14 years 11 months ago
Operationality Criteria for Recursive Predicates
Current explanation-based generalization (EBG) techniques can perform badly when the problem being solved involves recursion. Often an infinite series of learned concepts are gene...
Stanley Letovsky
CVPR
2004
IEEE
15 years 11 months ago
Thermal Face Recognition in an Operational Scenario
We present results on the latest advances in thermal infrared face recognition, and its use in combination with visible imagery. Previous research has shown high performance under...
Diego A. Socolinsky, Andrea Selinger
ICRA
2009
IEEE
127views Robotics» more  ICRA 2009»
15 years 4 months ago
Thermally constrained motor operation for a climbing robot
Abstract— Climbing robots are especially susceptible to thermal overload during normal operation, due to the need to oppose gravity and to frequently apply internal forces for cl...
Salomon Trujillo, Mark R. Cutkosky