Sciweavers

2801 search results - page 99 / 561
» On the Adequateness of the Connection Method
Sort
View
ICRA
2010
IEEE
127views Robotics» more  ICRA 2010»
15 years 2 months ago
Probabilistically complete planning with end-effector pose constraints
Abstract— We present a proof for the probabilistic completeness of RRT-based algorithms when planning with constraints on end-effector pose. Pose constraints can induce lowerdime...
Dmitry Berenson, Siddhartha S. Srinivasa
WCET
2010
15 years 2 months ago
On the Use of Context Information for Precise Measurement-Based Execution Time Estimation
The present paper investigates the influence of the execution history on the precision of measurementbased execution time estimates for embedded software. A new approach to timing...
Stefan Stattelmann, Florian Martin
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 1 months ago
Constraint-Guided Workflow Composition Based on the EDAM Ontology
Abstract. Methods for the automatic composition of services into executable workflows need detailed knowledge about the application domain, in particular about the available servic...
Anna-Lena Lamprecht, Stefan Naujokat, Bernhard Ste...
147
Voted
JMLR
2011
187views more  JMLR 2011»
14 years 11 months ago
Exploitation of Machine Learning Techniques in Modelling Phrase Movements for Machine Translation
We propose a distance phrase reordering model (DPR) for statistical machine translation (SMT), where the aim is to learn the grammatical rules and context dependent changes using ...
Yizhao Ni, Craig Saunders, Sándor Szedm&aac...
ICIP
2009
IEEE
16 years 5 months ago
Nl-means And Aggregation Procedures
Patch based denoising methods, such as the NL-Means, have emerged recently as simple and efficient denoising methods. This paper provides a new insight on those methods by showing...