Sciweavers

464 search results - page 69 / 93
» SQAK: doing more with keywords
Sort
View
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
14 years 1 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 29 days ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
ICAIL
2003
ACM
14 years 29 days ago
A Model Based Reasoning Approach for Generating Plausible Crime Scenarios from Evidence
Robust decision support systems (DSSs) for crime investigation are difficult to construct because of the almost infinite variation of plausible crime scenarios. Thus, existing ap...
Jeroen Keppens, John Zeleznikow
ISPD
2003
ACM
103views Hardware» more  ISPD 2003»
14 years 29 days ago
An integrated floorplanning with an efficient buffer planning algorithm
Previous works on buffer planning are mainly based on fixed die placement. It is necessary to reduce the complexity of computing the feasible buffer insertion sites to integrate t...
Yuchun Ma, Xianlong Hong, Sheqin Dong, Song Chen, ...
NSPW
2003
ACM
14 years 29 days ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin