Sciweavers

838 search results - page 93 / 168
» Propagation Redundancy in Redundant Modelling
Sort
View
CRV
2009
IEEE
156views Robotics» more  CRV 2009»
14 years 4 months ago
A Bayesian Algorithm for Reading 1D Barcodes
The 1D barcode is a ubiquitous labeling technology, with symbologies such as UPC used to label approximately 99% of all packaged goods in the US. It would be very convenient for c...
Ender Tekin, James Coughlan
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
14 years 3 months ago
Vision based motion control for a humanoid head
— This paper describes the design of a motion control algorithm for a humanoid robotic head, which consists of a neck with four degrees of freedom and two eyes (a stereo pair sys...
Ludo C. Visser, Raffaella Carloni, Stefano Stramig...
DFT
2008
IEEE
107views VLSI» more  DFT 2008»
14 years 3 months ago
Checkpointing of Rectilinear Growth in DNA Self-Assembly
Error detection/correction techniques have been advocated for algorithmic self-assembly. Under rectilinear growth, it requires only two additional tiles, generally referred to as ...
Stephen Frechette, Yong-Bin Kim, Fabrizio Lombardi
DATE
2007
IEEE
108views Hardware» more  DATE 2007»
14 years 3 months ago
Evaluation of design for reliability techniques in embedded flash memories
Non-volatile Flash memories are becoming more and more popular in Systems-on-Chip (SoC). Embedded Flash (eFlash) memories are based on the well-known floatinggate transistor conce...
Benoît Godard, Jean Michel Daga, Lionel Torr...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 3 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon