Sciweavers

1041 search results - page 123 / 209
» Biomedical Case Studies in Data Intensive Computing
Sort
View
DAC
2004
ACM
14 years 10 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
VMV
2001
131views Visualization» more  VMV 2001»
13 years 10 months ago
Shape Model and Threshold Extraction via Shape Gradients
Shape information is utilized by numerous applications in computer vision, scientific visualization and computer graphics. This paper presents a novel algorithm for exploring and ...
Roger C. Tam, Alain Fournier
ICRA
2006
IEEE
83views Robotics» more  ICRA 2006»
14 years 3 months ago
On the Treatment of Relative-pose Measurements for Mobile Robot Localization
— In this paper, we study the problem of localization using relative-state estimates. It is shown, that when the same exteroceptive sensor measurement is processed for the comput...
Anastasios I. Mourikis, Stergios I. Roumeliotis
SEW
2005
IEEE
14 years 2 months ago
Using Visualization to Understand Dependability: A Tool Support for Requirements Analysis
Dealing with dependability requirements is a complex task for stakeholders and analysts as many different aspects of a system must be taken into account at the same time: services...
Paolo Donzelli, Daniel Hirschbach, Victor R. Basil...
RTAS
2002
IEEE
14 years 1 months ago
Minimizing CAN Response-Time Jitter by Message Manipulation
Delay variations (jitter) in computations and communications cause degradation of performance in control applications. There are many sources of jitter, including variations in ex...
Thomas Nolte, Hans Hansson, Christer Norström