Exclude:

OPAC

E-Resources

Federated Resources

Premium Resources

Showing results for ''

Parallel processing in language production

Author:Bock J. K., Branigan H. P., Butterworth B., Charles-Luce J., Cutler A., Fay D., Fay D., Frazier L., Fromkin V. A., Garrett M. F., Garrett M. F., Garrett M. F., Garrett M. F., Harley T. A., Hwang H., Janssen N., Jescheniak J. D., Kaschak M. P., Kempen G., Levelt W. J. M., Navarrete E., Perret C., Port R., Shallice T., Slowiaczek L., Stemberger J. P., Turner E., Vigliocco G.
Publisher:Informa UK Limited
Abstract: Abstract is not available.

Categorization of indoor places using the Kinect sensor

Author:Bishop, Breiman, Chang, Cortes, Galindo, Hall, Hitoshi Mizutani, Knerr, Kruijff, Martinez, Nçchter, Ojala, Ojala, Oscar Martinez Mozos, Pronobis, Pronobis, Ryo Kurazume, Tsutomu Hasegawa, Vapnik, Wolf, Wu, Zender
Publisher:MDPI AG
Abstract: The categorization of places in indoor environments is an important capability for service robots w…

Scan registration for autonomous mining vehicles using 3D-NDT

Author:Besl, Biber, Chen, Gelfand, Greenspan, Mitra, Ripperda, Rusinkiewicz, Takeuchi, Wulf
Publisher:Wiley
Abstract: Scan registration is an essential subtask when building maps based on range finder data from mobile…

Multiservice QoS-Enabled MAC for Optical Burst Switching

Author:Chen, Chen, Cristina Cervelló-Pastor, Dimitra Simeonidou, Georgios S. Zervas, Gumaste, Hernández, Joan Triay, Lin, Liu, Overby, Peng, Rostami, Xu, Yoo, Zervas, Zhang, Zhang
Publisher:The Optical Society
Abstract: The emergence of a broad range of network-driven applications (e.g., multimedia, online gaming) bri…

Video shot boundary detection: seven years of TRECVid activity

Author:Aiden R. Doherty, Alan F. Smeaton, Doherty, Hanjalic, Heng, Joyce, Lewis, Lu, Manly, Nesvadba, Paul Over, Tan, Zhang
Publisher:Elsevier BV
Abstract: Shot boundary detection (SBD) is the process of automatically detecting the boundaries between shot…

Multicolour sketch recognition in a learning environment.

Author:Liam Don, Ioannis Ivrissimtzis
Publisher:Institute of Electrical and Electronics Engineers (IEEE)
Abstract: Virtual physics environments are becoming increasingly popular as a teaching tool for grade and hig…

MaxLength considered harmful to the RPKI

Author:Yossi Gilad, Sharon Goldberg, Omar Sagga
Publisher:Association for Computing Machinery (ACM)
Abstract: User convenience and strong security are often at odds, and most security applications need to find…

Efficient algorithms for pairing-based cryptosystems

Author:A. Joux, A.J. Menezes, A.J. Menezes, D. Boneh, D. Boneh, E. Verheul, E. Verheul, G. Frey, N. Koblitz, N. Tzanakis, R. Schroeppel, S. Galbraith, S. Galbraith, T. Itoh
Publisher:Springer Science and Business Media LLC
Abstract: We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In par…

Well Structured Transition Systems with History

Author:Parosh Abdulla, Giorgio Delzanno, Marco Montali
Publisher:Open Publishing Association
Abstract: We propose a formal model of concurrent systems in which the history of a computation is explicitly…

Resolving Distributed Knowledge

Author:Yì N. Wáng, Thomas Ã…gotnes
Publisher:Open Publishing Association
Abstract: Distributed knowledge is the sum of the knowledge in a group; what someone who is able to discern b…
Powered by: