Sciweavers

10797 search results - page 1995 / 2160
» Robust control applications
Sort
View
TOG
2002
133views more  TOG 2002»
15 years 3 months ago
Interactive motion generation from examples
There are many applications that demand large quantities of natural looking motion. It is difficult to synthesize motion that looks natural, particularly when it is people who mus...
Okan Arikan, David A. Forsyth
TVLSI
2002
102views more  TVLSI 2002»
15 years 3 months ago
Low-power data forwarding for VLIW embedded architectures
In this paper, we propose a low-power approach to the design of embedded very long instruction word (VLIW) processor architectures based on the forwarding (or bypassing) hardware, ...
Mariagiovanna Sami, Donatella Sciuto, Cristina Sil...
JEI
2008
128views more  JEI 2008»
15 years 3 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
113
Voted
SAC
2008
ACM
15 years 3 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
139
Voted
SAC
2008
ACM
15 years 3 months ago
A software architecture for ontology-driven situation awareness
Human operators of large-scale control systems face the problem of information overload induced by the large amount of information provided by multiple heterogeneous and highlydyn...
Norbert Baumgartner, Werner Retschitzegger, Wielan...
« Prev « First page 1995 / 2160 Last » Next »