Sciweavers

4899 search results - page 947 / 980
» Robust normative systems
Sort
View
IROS
2006
IEEE
147views Robotics» more  IROS 2006»
14 years 2 months ago
Opportunistic Use of Vision to Push Back the Path-Planning Horizon
Abstract— Mobile robots need maps or other forms of geometric information about the environment to navigate. The mobility sensors (LADAR, stereo, etc.) on these robotic vehicles ...
Bart C. Nabbe, Derek Hoiem, Alexei A. Efros, Marti...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 2 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 2 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
IMC
2006
ACM
14 years 2 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
MIR
2006
ACM
267views Multimedia» more  MIR 2006»
14 years 2 months ago
Matching slides to presentation videos using SIFT and scene background matching
We present a general approach for automatically matching electronic slides to videos of corresponding presentations for use in distance learning and video proceedings of conferenc...
Quanfu Fan, Kobus Barnard, Arnon Amir, Alon Efrat,...