Sciweavers

2261 search results - page 296 / 453
» Dynamic types for authentication
Sort
View
TSMC
2008
198views more  TSMC 2008»
13 years 9 months ago
Representation Plurality and Fusion for 3-D Face Recognition
In this paper, we present an extensive study of 3-D face recognition algorithms and examine the benefits of various score-, rank-, and decision-level fusion rules. We investigate f...
Berk Gökberk, Helin Dutagaci, A. Ulas, Lale A...
ASC
2004
13 years 9 months ago
Adaptive reconfiguration of data networks using genetic algorithms
Genetic algorithms are applied to an important, but little-investigated, network design problem, that of reconfiguring the topology and link capacities of an operational network t...
David J. Montana, Talib S. Hussain
CCE
2004
13 years 9 months ago
Retrospective on optimization
In this paper we provide a general classification of mathematical optimization problems, followed by a matrix of applications that shows the areas in which these problems have bee...
Lorenz T. Biegler, Ignacio E. Grossmann
NN
2000
Springer
142views Neural Networks» more  NN 2000»
13 years 8 months ago
Towards a neural network based therapy for hallucinatory disorders
Pattern completion in a neural network model of the thalamus and a biologically plausible model of synaptic plasticity are the key concepts used in this paper for analyzing some c...
Javier Ropero Peláez
GIS
2002
ACM
13 years 8 months ago
Characterisation and generalisation of cartographic lines using Delaunay triangulation
A method is presented for generalising cartographic lines using an approach based on determination of their structure. Constrained Delaunay triangulation is used to construct a ske...
P. M. van der Poorten, Christopher B. Jones