Sciweavers

119 search results - page 22 / 24
» Naming and Addressing of Objects Without Unique Identifiers
Sort
View
163
Voted
PAMI
2012
13 years 6 months ago
Learning Optimal Embedded Cascades
—The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and...
Mohammad Javad Saberian, Nuno Vasconcelos
120
Voted
BLISS
2009
IEEE
15 years 4 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
133
Voted
GIS
2010
ACM
15 years 1 months ago
Tolerance geometry: Euclid's first postulate for points and lines with extension
Object representation and reasoning in vector based geographic information systems (GIS) is based on Euclidean geometry. Euclidean geometry is built upon Euclid's first postu...
Gwen Wilke, Andrew U. Frank
169
Voted
WORDS
2003
IEEE
15 years 9 months ago
Improving Dependability of Service Oriented Architectures for Pervasive Computing
Service Oriented Programming - which combines Distributed Object Compunting, Component Based and webbased concepts - has recently emerged as a promising approach to develop dynami...
Domenico Cotroneo, Cristiano di Flora, Stefano Rus...
169
Voted
SIGCSE
2012
ACM
282views Education» more  SIGCSE 2012»
13 years 11 months ago
Understanding the tenets of agile software engineering: lecturing, exploration and critical thinking
The use of agile principles and practices in software development is becoming a powerful force in today’s workplace. In our quest to develop better products, therefore, it is im...
Shvetha Soundararajan, Amine Chigani, James D. Art...