Sciweavers

1622 search results - page 314 / 325
» Autonomous Mobile Programs
Sort
View
IWVF
2001
Springer
14 years 7 hour ago
Judging Whether Multiple Silhouettes Can Come from the Same Object
We consider the problem of recognizing an object from its silhouette. We focus on the case in which the camera translates, and rotates about a known axis parallel to the image, suc...
David W. Jacobs, Peter N. Belhumeur, Ian Jermyn
IWAN
1999
Springer
13 years 11 months ago
Policy Specification for Programmable Networks
There is a need to be able to program network components to adapt to application requirements for quality of service, specialised application dependent routing, to increase effici...
Morris Sloman, Emil Lupu
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 11 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
FGR
2004
IEEE
102views Biometrics» more  FGR 2004»
13 years 11 months ago
Towards a One-Way American Sign Language Translator
Inspired by the Defense Advanced Research Projects Agency's (DARPA) recent successes in speech recognition, we introduce a new task for sign language recognition research: a ...
R. Martin McGuire, Jose L. Hernandez-Rebollar, Tha...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 9 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...