Sciweavers

344 search results - page 59 / 69
» Automated Weld Tracking
Sort
View
JUCS
2010
162views more  JUCS 2010»
13 years 8 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
DEXA
2010
Springer
138views Database» more  DEXA 2010»
13 years 7 months ago
Enrichment of Raw Sensor Data to Enable High-Level Queries
Abstract. Sensor networks are increasingly used across various application domains. Their usage has the advantage of automated, often continuous, monitoring of activities and event...
Kenneth Conroy, Mark Roantree
ICAI
2010
13 years 7 months ago
Constraint-Based Dogleg Channel Routing with Via Minimization
- In this article, we present an algorithm which is capable of transforming a gridded dogleg channel routing problem into a constraint programming (CP) problem. The transformed CP ...
I-Lun Tseng, Huan-Wen Chen, Che-I Lee, Adam Postul...
AIED
2011
Springer
13 years 1 months ago
Faster Teaching by POMDP Planning
Both human and automated tutors must infer what a student knows and plan future actions to maximize learning. Though substantial research has been done on tracking and modeling stu...
Anna N. Rafferty, Emma Brunskill, Thomas L. Griffi...
DAC
2002
ACM
14 years 10 months ago
Scheduler-based DRAM energy management
Previous work on DRAM power-mode management focused on hardware-based techniques and compiler-directed schemes to explicitly transition unused memory modules to low-power operatin...
Victor Delaluz, Anand Sivasubramaniam, Mahmut T. K...