Sciweavers

1626 search results - page 147 / 326
» Computing the Types of the Relationships between Autonomous ...
Sort
View
JAISE
2011
238views more  JAISE 2011»
13 years 3 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
CDC
2008
IEEE
150views Control Systems» more  CDC 2008»
14 years 3 months ago
Riccati conditioning and sensitivity for a MinMax controlled cable-mass system
— In this paper we study the relationship between the parameter θ, used in the design of the MinMax controller, and the conditioning of the approximate algebraic Riccati equatio...
Lizette Zietsman, Katie A. Evans, J. Teye Brown, R...
EMSOFT
2008
Springer
13 years 10 months ago
Wireless channel access reservation for embedded real-time systems
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...
ACSW
2007
13 years 10 months ago
An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology
The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. T...
Jon Patrick, Yefeng Wang, Peter Budd
CCS
2008
ACM
13 years 11 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan