Sciweavers

11168 search results - page 2088 / 2234
» Abstract State Processes
Sort
View
ICEIS
2009
IEEE
13 years 8 months ago
Mining Patterns in the Presence of Domain Knowledge
One of the main difficulties of pattern mining is to deal with items of different nature in the same itemset, which can occur in any domain except basket analysis. Indeed, if we co...
Cláudia Antunes
ICNP
2009
IEEE
13 years 8 months ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
ICPP
2009
IEEE
13 years 8 months ago
Stochastic-Based Robust Dynamic Resource Allocation in a Heterogeneous Computing System
Abstract--This research investigates the problem of robust dynamic resource allocation for heterogeneous distributed computing systems operating under imposed constraints. Often, s...
Jay Smith, Edwin K. P. Chong, Anthony A. Maciejews...
ICRA
2009
IEEE
208views Robotics» more  ICRA 2009»
13 years 8 months ago
Affordance based word-to-meaning association
Abstract-- This paper presents a method to associate meanings to words in manipulation tasks. We base our model on an affordance network, i.e., a mapping between robot actions, rob...
Verica Krunic, Giampiero Salvi, Alexandre Bernardi...
ICST
2009
IEEE
13 years 8 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
« Prev « First page 2088 / 2234 Last » Next »