Sciweavers

1005 search results - page 176 / 201
» Practical Secure Function Evaluation
Sort
View
TCSV
2008
297views more  TCSV 2008»
13 years 7 months ago
Activity Analysis, Summarization, and Visualization for Indoor Human Activity Monitoring
Abstract--In this work, we study how continuous video monitoring and intelligent video processing can be used in eldercare to assist the independent living of elders and to improve...
Zhongna Zhou, Xi Chen, Yu-Chia Chung, Zhihai He, T...
AUTOMATICA
2002
81views more  AUTOMATICA 2002»
13 years 7 months ago
The explicit linear quadratic regulator for constrained systems
For discrete-time linear time invariant systems with constraints on inputs and states, we develop an algorithm to determine explicitly, the state feedback control law which minimi...
Alberto Bemporad, Manfred Morari, Vivek Dua, Efstr...
IJCIM
2002
99views more  IJCIM 2002»
13 years 7 months ago
A distributed, event-driven control architecture for flexibly automated manufacturing systems
This paper presents a new distributed real-time control architecture for flexibly automated production systems. The modelling assumptions underlying the design en by, and abstract,...
Jonghun Park, Spyros A. Reveliotis, Douglas A. Bod...
ARTMED
1999
92views more  ARTMED 1999»
13 years 7 months ago
Two-Stage Machine Learning model for guideline development
We present a Two-Stage Machine Learning (ML) model as a data mining method to develop practice guidelines and apply it to the problem of dementia staging. Dementia staging in clin...
Subramani Mani, William Rodman Shankle, Malcolm B....
ATMOS
2010
169views Optimization» more  ATMOS 2010»
13 years 5 months ago
Traffic Signal Optimization Using Cyclically Expanded Networks
Traditionally, the coordination of multiple traffic signals and the traffic assignment problem in an urban street network are considered as two separate optimization problems. How...
Ekkehard Köhler, Martin Strehler