Sciweavers

678 search results - page 130 / 136
» An evaluation of combination strategies for test case select...
Sort
View
ICRA
1998
IEEE
144views Robotics» more  ICRA 1998»
13 years 11 months ago
The Atacama Desert Trek: Outcomes
In June and July 1997, Nomad, a planetary-relevant mobile robot, traversed more than 220 kilometers across the barren Atacama Desert in Chile, exploring a landscape analogous to t...
Deepak Bapna, Eric Rollins, John Murphy, Mark W. M...
WS
2008
ACM
13 years 7 months ago
Recommendations based on semantically enriched museum collections
This article presents the CHIP demonstrator5 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, an...
Yiwen Wang, Natalia Stash, Lora Aroyo, Peter Gorge...
CVIU
2010
163views more  CVIU 2010»
13 years 7 months ago
Automated handwashing assistance for persons with dementia using video and a partially observable Markov decision process
This paper presents a real-time vision-based system to assist a person with dementia wash their hands. The system uses only video inputs, and assistance is given as either verbal ...
Jesse Hoey, Pascal Poupart, Axel von Bertoldi, Tam...
CCGRID
2011
IEEE
12 years 11 months ago
Improving Utilization of Infrastructure Clouds
— A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either...
Paul Marshall, Kate Keahey, Timothy Freeman
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 5 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...