Sciweavers

20175 search results - page 4016 / 4035
» Is abstraction the key to computing
Sort
View
ICRA
2010
IEEE
301views Robotics» more  ICRA 2010»
13 years 7 months ago
People tracking with human motion predictions from social forces
Abstract— For many tasks in populated environments, robots need to keep track of present and future motion states of people. Most approaches to people tracking make weak assumpti...
Matthias Luber, Johannes Andreas Stork, Gian Diego...
JCST
2010
119views more  JCST 2010»
13 years 7 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JFP
2010
107views more  JFP 2010»
13 years 7 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
TSP
2008
132views more  TSP 2008»
13 years 7 months ago
On Doubly Selective Channel Estimation Using Superimposed Training and Discrete Prolate Spheroidal Sequences
Abstract--Channel estimation and data detection for frequencyselective time-varying channels are considered using superimposed training. We employ a discrete prolate spheroidal bas...
Shuangchi He, Jitendra K. Tugnait
LPAR
2010
Springer
13 years 7 months ago
The Consistency of the CADIAG-2 Knowledge Base: A Probabilistic Approach
Abstract. The paper presents the methodology and the results of checking consistency of the knowledge base of CADIAG-2, a large-scale medical expert system. Such knowledge base con...
Pavel Klinov, Bijan Parsia, David Picado-Mui&ntild...
« Prev « First page 4016 / 4035 Last » Next »