Sciweavers

811 search results - page 117 / 163
» Refactoring Using Type Constraints
Sort
View
ICASSP
2010
IEEE
13 years 9 months ago
Camera-based clear path detection
In using image analysis to assist a driver to avoid obstacles on the road, traditional approaches rely on various detectors designed to detect different types of objects. We propo...
Qi Wu, Wende Zhang, Tsuhan Chen, B. V. K. Vijaya K...
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 9 months ago
A Framework for Interactive Work Design based on Digital Work Analysis and Simulation
Due to the flexibility and adaptability of human, manual handling work is still very important in industry, especially for assembly and maintenance work. Well-designed work operat...
Liang Ma, Wei Zhang, Huanzhang Fu, Yang Guo, Damie...
ENTCS
2008
105views more  ENTCS 2008»
13 years 9 months ago
Declaring Numbers
Most implementations of functional and functional logic languages treat numbers and the basic numeric operations as external entities. The main reason for this is efficiency. Howe...
Bernd Braßel, Sebastian Fischer, Frank Huch
JCP
2006
110views more  JCP 2006»
13 years 8 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
TSE
2008
128views more  TSE 2008»
13 years 8 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón