Sciweavers

180 search results - page 15 / 36
» How Thorough Is Thorough Enough
Sort
View
CORR
2010
Springer
249views Education» more  CORR 2010»
13 years 7 months ago
Performance Analysis of Spectral Clustering on Compressed, Incomplete and Inaccurate Measurements
Spectral clustering is one of the most widely used techniques for extracting the underlying global structure of a data set. Compressed sensing and matrix completion have emerged a...
Blake Hunter, Thomas Strohmer
TSE
1998
77views more  TSE 1998»
13 years 7 months ago
Use Case Maps as Architectural Entities for Complex Systems
ABSTRACT. This paper presents a novel, scenario-based notation called Use Case Maps (UCMs) for describing, in a high-level way, how the organizational structure of a complex system...
Raymond J. A. Buhr
ICRA
2010
IEEE
97views Robotics» more  ICRA 2010»
13 years 6 months ago
Probabilistic motion planning of balloons in strong, uncertain wind fields
—This paper introduces a new algorithm for probabilistic motion planning in arbitrary, uncertain vector fields, with emphasis on high-level planning for Montgolfier´e balloons...
Michael T. Wolf, Lars Blackmore, Yoshiaki Kuwata, ...
MANSCI
2010
106views more  MANSCI 2010»
13 years 5 months ago
Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty
This paper considers a manufacturer-retailer supply chain for a seasonal product whose demand is weather-sensitive. The retailer orders from the manufacturer (supplier) prior to t...
Frank Youhua Chen, Candace Arai Yano
FDTC
2011
Springer
267views Cryptology» more  FDTC 2011»
12 years 7 months ago
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
Abstract—The literature about fault analysis typically describes fault injection mechanisms, e.g. glitches and lasers, and cryptanalytic techniques to exploit faults based on som...
Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwh...