Sciweavers

1176 search results - page 201 / 236
» Exploiting Online Games
Sort
View
ET
2008
92views more  ET 2008»
13 years 8 months ago
Hardware and Software Transparency in the Protection of Programs Against SEUs and SETs
Processor cores embedded in systems-on-a-chip (SoCs) are often deployed in critical computations, and when affected by faults they may produce dramatic effects. When hardware harde...
Eduardo Luis Rhod, Carlos Arthur Lang Lisbôa...
IVC
2007
191views more  IVC 2007»
13 years 8 months ago
Rotation-invariant and scale-invariant Gabor features for texture image retrieval
Conventional Gabor representation and its extracted features often yield a fairly poor performance in retrieving the rotated and scaled versions of the texture image under query. ...
Ju Han, Kai-Kuang Ma
ICANN
2010
Springer
13 years 7 months ago
Autonomous Generation of Internal Representations for Associative Learning
In this contribution, we explore the possibilities of learning in large-scale, multimodal processing systems operating under real-world conditions. Using an instance of a large-sca...
Michaël Garcia Ortiz, Benjamin Dittes, Jannik...
ICRA
2010
IEEE
141views Robotics» more  ICRA 2010»
13 years 7 months ago
A novel framework for closed-loop robotic motion simulation - part I: Inverse kinematics design
— This paper considers the problem of realizing a 6-DOF closed-loop motion simulator by exploiting an anthropomorphic serial manipulator as motion platform. Contrary to standard ...
Paolo Robuffo Giordano, Carlo Masone, Joachim Tesc...
IEEECIT
2010
IEEE
13 years 7 months ago
A P2P REcommender System based on Gossip Overlays (PREGO)
—Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building an...
Matteo Mordacchini, Ranieri Baraglia, Patrizio Daz...