Sciweavers

1844 search results - page 346 / 369
» Exploiting the Structure of Distributed Constraint Optimizat...
Sort
View
135
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
129
Voted
FORTE
2007
15 years 5 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
15 years 10 months ago
Visual Servoing in Non-Rigid Environments: A Space-Time Approach
— Most robotic vision algorithms are proposed by envisaging robots operating in structured environments where the world is assumed to be rigid. These algorithms fail to provide o...
D. Santosh, C. V. Jawahar
169
Voted
CASES
2007
ACM
15 years 8 months ago
INTACTE: an interconnect area, delay, and energy estimation tool for microarchitectural explorations
Prior work on modeling interconnects has focused on optimizing the wire and repeater design for trading off energy and delay, and is largely based on low level circuit parameters....
Rahul Nagpal, Arvind Madan, Bharadwaj Amrutur, Y. ...
152
Voted
ECCV
1998
Springer
16 years 5 months ago
Multi-Step Procedures for the Localization of 2D and 3D Point Landmarks and Automatic ROI Size Selection
In this contribution, we are concerned with the detection and re ned localization of 3D point landmarks. We propose multi-step di erential procedures for subvoxel localization of 3...
Sönke Frantz, Karl Rohr, H. Siegfried Stiehl