Sciweavers

119 search results - page 22 / 24
» Naming and Addressing of Objects Without Unique Identifiers
Sort
View
PAMI
2012
11 years 9 months ago
Learning Optimal Embedded Cascades
—The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and...
Mohammad Javad Saberian, Nuno Vasconcelos
BLISS
2009
IEEE
13 years 8 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
GIS
2010
ACM
13 years 5 months ago
Tolerance geometry: Euclid's first postulate for points and lines with extension
Object representation and reasoning in vector based geographic information systems (GIS) is based on Euclidean geometry. Euclidean geometry is built upon Euclid's first postu...
Gwen Wilke, Andrew U. Frank
WORDS
2003
IEEE
14 years 19 days ago
Improving Dependability of Service Oriented Architectures for Pervasive Computing
Service Oriented Programming - which combines Distributed Object Compunting, Component Based and webbased concepts - has recently emerged as a promising approach to develop dynami...
Domenico Cotroneo, Cristiano di Flora, Stefano Rus...
SIGCSE
2012
ACM
282views Education» more  SIGCSE 2012»
12 years 2 months ago
Understanding the tenets of agile software engineering: lecturing, exploration and critical thinking
The use of agile principles and practices in software development is becoming a powerful force in today’s workplace. In our quest to develop better products, therefore, it is im...
Shvetha Soundararajan, Amine Chigani, James D. Art...