Sciweavers

2038 search results - page 331 / 408
» Loops under Strategies
Sort
View
116
Voted
FOCM
2010
161views more  FOCM 2010»
15 years 2 months ago
The Asymptotics of Wilkinson's Shift: Loss of Cubic Convergence
One of the most widely used methods for eigenvalue computation is the QR iteration with Wilkinson’s shift: here the shift s is the eigenvalue of the bottom 2 × 2 principal mino...
Ricardo S. Leite, Nicolau C. Saldanha, Carlos Tome...
134
Voted
ICANN
2010
Springer
15 years 2 months ago
Autonomous Generation of Internal Representations for Associative Learning
In this contribution, we explore the possibilities of learning in large-scale, multimodal processing systems operating under real-world conditions. Using an instance of a large-sca...
Michaël Garcia Ortiz, Benjamin Dittes, Jannik...
117
Voted
ICRA
2010
IEEE
111views Robotics» more  ICRA 2010»
15 years 2 months ago
Human-guided grasp measures improve grasp robustness on physical robot
— Humans are adept at grasping different objects robustly for different tasks. Robotic grasping has made significant progress, but still has not reached the level of robustness ...
Ravi Balasubramanian, Ling Xu, Peter D. Brook, Jos...
JNSM
2008
104views more  JNSM 2008»
15 years 2 months ago
Call Forwarding-Based Active Probing for POTS Fault Isolation
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
Chi-Shih Chao, Maitreya Natu, Adarshpal S. Sethi
IJIPT
2010
91views more  IJIPT 2010»
15 years 2 months ago
Detecting and blocking P2P botnets through contact tracing chains
: Peer-to-peer (P2P) botnets have recently become serious security threats on the internet. It is difficult to detect the propagation of P2P botnets by isolated monitoring on indiv...
Zhiyong Huang, Xiaoping Zeng, Yong Liu