Sciweavers

6393 search results - page 1271 / 1279
» Randomized Algorithms on the Mesh
Sort
View
PAMI
2007
133views more  PAMI 2007»
13 years 7 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
CIKM
2010
Springer
13 years 6 months ago
Document allocation policies for selective searching of distributed indexes
Indexes for large collections are often divided into shards that are distributed across multiple computers and searched in parallel to provide rapid interactive search. Typically,...
Anagha Kulkarni, Jamie Callan
ICRA
2010
IEEE
202views Robotics» more  ICRA 2010»
13 years 6 months ago
A robust state estimation method against GNSS outage for unmanned miniature helicopters
Abstract— Most unmanned aerial robots use a Global Navigation Satellite System (GNSS), such as GPS, GLONASS, and Galileo, for their navigation. However, from time to time the GNS...
Tak-Kit Lau, Yun-hui Liu, Kai-wun Lin
IJRR
2010
185views more  IJRR 2010»
13 years 6 months ago
FISST-SLAM: Finite Set Statistical Approach to Simultaneous Localization and Mapping
The solution to the problem of mapping an environment and at the same time using this map to localize (the simultaneous localization and mapping, SLAM, problem) is a key prerequis...
Bharath Kalyan, K. W. Lee, W. Sardha Wijesoma
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints
—With the convergence of multimedia applications and wireless communications, there is an urgent need for developing new scheduling algorithms to support real-time traffic with ...
Sheu-Sheu Tan, Dong Zheng, Junshan Zhang, James R....
« Prev « First page 1271 / 1279 Last » Next »