Sciweavers

4899 search results - page 840 / 980
» Robust normative systems
Sort
View
WETICE
2000
IEEE
14 years 2 months ago
CVE Technology Development Based on Real World Application and User Needs
This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...
BMCV
2000
Springer
14 years 2 months ago
Towards a Computational Model for Object Recognition in IT Cortex
First IEEE International Workshop on Biologically Motivated Computer Vision, Seoul, Korea (May 2000). There is considerable evidence that object recognition in primates is based o...
David G. Lowe
CIA
2000
Springer
14 years 2 months ago
Applying Agents to Bioinformatics in GeneWeaver
Recent years have seen dramatic and sustained growth in the amount of genomic data being generated, including in late 1999 the first complete sequence of a human chromosome. The c...
Kevin Bryson, Michael Luck, Mike Joy, David T. Jon...
ICCAD
1999
IEEE
97views Hardware» more  ICCAD 1999»
14 years 2 months ago
A methodology for correct-by-construction latency insensitive design
In Deep Sub-Micron (DSM) designs, performance will depend critically on the latency of long wires. We propose a new synthesis methodology for synchronous systems that makes the de...
Luca P. Carloni, Kenneth L. McMillan, Alexander Sa...
ICRA
1999
IEEE
192views Robotics» more  ICRA 1999»
14 years 2 months ago
Cooperative Robot Localization with Vision-Based Mapping
Two stereo vision-based mobile robots navigate and autonomously explore their environment safely while building occupancy grid maps of the environment. A novel landmark recognitio...
Cullen Jennings, Don Murray, James J. Little