Sciweavers

16216 search results - page 35 / 3244
» Effective Modeling with Constraints
Sort
View
130
Voted
CDC
2009
IEEE
120views Control Systems» more  CDC 2009»
15 years 8 months ago
Networked and quantized control systems with communication delays
— There are many communication imperfections in networked control systems (NCSs) such as varying sampling/transmission intervals, varying delays, possible packet loss, communicat...
W. P. M. H. Heemels, Dragan Nesic, Andrew R. Teel,...
AVBPA
2003
Springer
172views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Constraint Shape Model Using Edge Constraint and Gabor Wavelet Based Search
: Constraint Shape Model is proposed to extract facial feature using two different search methods for contour points and control points individually. In the proposed algorithm, sal...
Baochang Zhang, Wen Gao, Shiguang Shan, Wei Wang
AIEDU
2006
120views more  AIEDU 2006»
15 years 4 months ago
An Assessment of Constraint-Based Tutors: A Response to Mitrovic and Ohlsson's Critique of "A Comparison of Model-Tracing and Co
Model tracing and constraint-based modeling are two prominent paradigms on which intelligent tutoring systems (ITSs) have been based. We Kodaganallur, Weitz and Rosenthal (2005), h...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
INFOSCALE
2007
ACM
15 years 5 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü