Sciweavers

2399 search results - page 386 / 480
» On Authentication between Human and Computer
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
DEVISE: A Methodology for Building Web Services Based Infrastructure for Collaborative Enterprises
Web Services define a new paradigm in present-day collaborative application development in enterprises, and span systems, networks, and organizations. Emerging computing infrastru...
N. Dhyanesh, G. C. Vineel, S. V. Raghavan
SAC
2003
ACM
14 years 1 months ago
Image Retrieval With Embedded Region Relationships
Image retrieval based on content from digital libraries, multimedia databases, the Internet, and other sources has been an important problem addressed by several researchers. In t...
Sharat Chandran, Naga Kiran
ICPADS
2002
IEEE
14 years 1 months ago
Self-Stabilizing Wormhole Routing on Ring Networks
Wormhole routing is most common in parallel architectures in which messages are sent in small fragments called flits. It is a lightweight and efficient method of routing message...
Ajoy Kumar Datta, Maria Gradinariu, Anthony B. Ken...
VISUALIZATION
2002
IEEE
14 years 1 months ago
Tensor Field Visualisation using Adaptive Filtering of Noise Fields combined with Glyph Rendering
While many methods exist for visualising scalar and vector data, visualisation of tensor data is still troublesome. We present a method for visualising second order tensors in thr...
Andreas Sigfridsson, Tino Ebbers, Einar Heiberg, L...
GECCO
2010
Springer
167views Optimization» more  GECCO 2010»
14 years 1 months ago
Evolving CPPNs to grow three-dimensional physical structures
The majority of work in the field of evolutionary robotics concerns itself with evolving control strategies for human designed or bio-mimicked robot morphologies. However, there ...
Joshua E. Auerbach, Josh C. Bongard