Sciweavers

15781 search results - page 3049 / 3157
» Evaluating Information Extraction
Sort
View
CPAIOR
2009
Springer
15 years 10 months ago
Optimal Interdiction of Unreactive Markovian Evaders
The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdi...
Alexander Gutfraind, Aric A. Hagberg, Feng Pan
DAMON
2009
Springer
15 years 10 months ago
Cache-conscious buffering for database operators with state
Database processes must be cache-efficient to effectively utilize modern hardware. In this paper, we analyze the importance of temporal locality and the resultant cache behavior ...
John Cieslewicz, William Mee, Kenneth A. Ross
ICB
2009
Springer
194views Biometrics» more  ICB 2009»
15 years 10 months ago
FM Model Based Fingerprint Reconstruction from Minutiae Template
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Jianjiang Feng, Anil K. Jain
IFIP
2009
Springer
15 years 10 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
148
Voted
MICAI
2009
Springer
15 years 10 months ago
People Detection by a Mobile Robot Using Stereo Vision in Dynamic Indoor Environments
People detection and tracking is a key issue for social robot design and effective human robot interaction. This paper addresses the problem of detecting people with a mobile robo...
José Alberto Méndez-Polanco, Ang&eac...
« Prev « First page 3049 / 3157 Last » Next »