Sciweavers

838 search results - page 135 / 168
» Propagation Redundancy in Redundant Modelling
Sort
View
AVBPA
2005
Springer
308views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Biometric Recognition Using Feature Selection and Combination
Most of the prior work in biometric literature has only emphasized on the issue of feature extraction and classification. However, the critical issue of examining the usefulness of...
Ajay Kumar, David Zhang
CIS
2005
Springer
14 years 2 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
EUROPAR
2004
Springer
14 years 2 months ago
Improving the Scalability of Logarithmic-Degree DHT-Based Peer-to-Peer Networks
High scalability in Peer-to-Peer (P2P) systems has been achieved with the emergence of the networks based on Distributed Hash Table (DHT). Most of the DHTs can be regarded as expon...
Bruno Carton, Valentin Mesaros
ICRA
2003
IEEE
101views Robotics» more  ICRA 2003»
14 years 2 months ago
A Branch-and-Prune Algorithm for Solving Systems of Distance Constraints
— Given a set of affine varieties in ℜ3, i.e. planes, lines, and points, the problem tackled in this paper is that of finding all possible configurations for these varieties...
Josep M. Porta, Federico Thomas, Lluís Ros,...
DEXA
2003
Springer
115views Database» more  DEXA 2003»
14 years 2 months ago
Storing and Querying XML Data in the Nested Relational Sequence Database System
Abstract. We developed the Nested Relational Sequence Database System (NRSD System), which is built upon the Nested Relational Sequence Model (NRSM). The NRSM eliminates a substant...
Ho Lam Lau, Wilfred Ng