Sciweavers

694 search results - page 102 / 139
» Overcoming Challenges of Maturity
Sort
View
PRL
2007
180views more  PRL 2007»
13 years 10 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
PUC
2008
109views more  PUC 2008»
13 years 10 months ago
Adapting paper prototyping for designing user interfaces for multiple display environments
A multiple display environment (MDE) networks personal and shared devices to form a virtual workspace, and designers are just beginning to grapple with the challenges of developing...
Brian P. Bailey, Jacob T. Biehl, Damon J. Cook, He...
HUC
2010
Springer
13 years 9 months ago
Routine as resource for the design of learning systems
Even though the coordination of kids’ activities is largely successful, the modern dual income family still regularly experiences breakdowns in their practices. Families often r...
Scott Davidoff
ICCBR
2010
Springer
13 years 9 months ago
Applying Machine Translation Evaluation Techniques to Textual CBR
The need for automated text evaluation is common to several AI disciplines. In this work, we explore the use of Machine Translation (MT) evaluation metrics for Textual Case Based R...
Ibrahim Adeyanju, Nirmalie Wiratunga, Robert Lothi...
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
13 years 9 months ago
Planning for autonomous door opening with a mobile manipulator
Abstract— Computing a motion that enables a mobile manipulator to open a door is challenging because it requires tight coordination between the motions of the arm and the base. H...
Sachin Chitta, Benjamin J. Cohen, Maxim Likhachev