Sciweavers

437 search results - page 70 / 88
» Policy Gradient Critics
Sort
View
CRV
2004
IEEE
226views Robotics» more  CRV 2004»
14 years 1 months ago
Inter-Image Statistics for Scene Reconstruction
We present an approach for inferring complete depth maps from intensity images and sparse depth information. This paper developed prior work which incrementally completes a sparse...
Luz Abril Torres-Méndez, Gregory Dudek, Pau...
ESTIMEDIA
2006
Springer
14 years 1 months ago
Neighbors-on-Path: A New Selection Strategy for On-Chip Networks
Efficient and deadlock-free routing is critical to the performance of networks-on-chip. In this paper we present an approach that can be coupled to any adaptive routing algorithm ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ACSAC
2001
IEEE
14 years 1 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
WSC
2007
14 years 8 days ago
Hospital capacity planning for efficient disaster mitigation during a bioterrorist attack
Effective hospital capacity planning can not only significantly enhance the capability and effectiveness of the treatment provided to patients during a bioterrorist attack but can...
Jomon Aliyas Paul, Govind Hariharan
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
13 years 12 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...