Sciweavers

9683 search results - page 1878 / 1937
» Query performance prediction
Sort
View
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
13 years 6 months ago
Visual odometry priors for robust EKF-SLAM
— One of the main drawbacks of standard visual EKF-SLAM techniques is the assumption of a general camera motion model. Usually this motion model has been implemented in the liter...
Pablo Fernández Alcantarilla, Luis Miguel B...
JOCN
2010
104views more  JOCN 2010»
13 years 6 months ago
Spatial Attention Evokes Similar Activation Patterns for Visual and Auditory Stimuli
■ Neuroimaging studies suggest that a fronto-parietal network is activated when we expect visual information to appear at a specific spatial location. Here we examined whether a...
David V. Smith, Ben Davis, Kathy Niu, Eric W. Heal...
NECO
2010
103views more  NECO 2010»
13 years 6 months ago
Posterior Weighted Reinforcement Learning with State Uncertainty
Reinforcement learning models generally assume that a stimulus is presented that allows a learner to unambiguously identify the state of nature, and the reward received is drawn f...
Tobias Larsen, David S. Leslie, Edmund J. Collins,...
PDP
2010
IEEE
13 years 6 months ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao
« Prev « First page 1878 / 1937 Last » Next »