Sciweavers

1270 search results - page 71 / 254
» IF Validation Environment Tutorial
Sort
View
P2P
2010
IEEE
280views Communications» more  P2P 2010»
13 years 8 months ago
Performance Evaluation of Peer-to-Peer Gaming Overlays
—In this demo we present a performance evaluation testbed for peer-to-peer gaming overlays. It consists of a 3D first person shooter game that is designed to run in a simulated ...
Max Lehn, Tonio Triebel, Cchritof Leng, Alejandro ...
ICPR
2010
IEEE
13 years 8 months ago
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models
In this paper, to provide a robot with information relative to structure of its environment, we propose a method to recognize types of structural corridor landmarks such as T-junct...
Youngbin Park, Sung Su Kim, Il Hong Suh
EICS
2009
ACM
14 years 4 months ago
Edit, inspect and connect your surroundings: a reference framework for meta-UIs
Discovering and unlocking the full potential of complex pervasive environments is still approached in application-centric ways. A set of statically deployed applications often de...
Geert Vanderhulst, Daniel Schreiber, Kris Luyten, ...
DAC
1998
ACM
14 years 11 months ago
Rate Derivation and Its Applications to Reactive, Real-Time Embedded Systems
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
Ali Dasdan, Dinesh Ramanathan, Rajesh K. Gupta
ICDE
2006
IEEE
143views Database» more  ICDE 2006»
14 years 4 months ago
Effectiveness Bounds for Non-Exhaustive Schema Matching Systems
Semantic validation of the effectiveness of a schema matching system is traditionally performed by comparing system-generated mappings with those of human evaluators. The human ef...
Marko Smiljanic, Maurice van Keulen, Willem Jonker