Sciweavers

192 search results - page 28 / 39
» Constraint-Based Approach for Analysis of Hybrid Systems
Sort
View
PRL
2007
180views more  PRL 2007»
13 years 7 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
IJBIS
2010
145views more  IJBIS 2010»
13 years 5 months ago
A multi-attribute group decision support system for information technology project selection
: The increasing intensity of global competition and the rapid advances in information technology (IT) have led organisations to search for more efficient and effective ways to man...
Faramak Zandi, Madjid Tavana
ISMAR
2006
IEEE
14 years 1 months ago
Going out: robust model-based tracking for outdoor augmented reality
This paper presents a model-based hybrid tracking system for outdoor augmented reality in urban environments enabling accurate, realtime overlays for a handheld device. The system...
Gerhard Reitmayr, Tom Drummond
ICDAR
2009
IEEE
13 years 5 months ago
Prototype Selection for Handwritten Connected Digits Classification
After the handwritten segmentation process, it is common to have connected digits. This is due to the great size and shape digit variations. In addition, the acquisition and the b...
Cristiano de Santana Pereira, George D. C. Cavalca...
KIVS
2005
Springer
14 years 1 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...