Sciweavers

91 search results - page 14 / 19
» Defining Misuse within the Development Process
Sort
View
MVA
2006
430views Computer Vision» more  MVA 2006»
13 years 7 months ago
Automatic fog detection and estimation of visibility distance through use of an onboard camera
In this paper, we will present a technique for measuring visibility distances under foggy weather conditions using a camera mounted onboard a moving vehicle. Our research has focus...
Nicolas Hautière, Jean-Philippe Tarel, Jean...
ICPR
2004
IEEE
14 years 8 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
IRI
2006
IEEE
14 years 1 months ago
Provide relevant knowledge to specify product design project needs
1 In many of today’s industry, knowledge is considered a strategic tool; however, knowledge is involved in so many services with so many facets that it is very complex to effecti...
Fabrice Alizon, Steven B. Shooter, Timothy W. Simp...
IJCINI
2007
112views more  IJCINI 2007»
13 years 7 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer
ICSR
2004
Springer
14 years 1 months ago
XML-Based Feature Modelling
This paper describes a feature modelling technique aimed at modelling the software assets behind a product family. The proposed technique is distinctive in five respects. First, it...
Vaclav Cechticky, Alessandro Pasetti, O. Rohlik, W...