Sciweavers

570 search results - page 73 / 114
» Robustness and Implementability of Timed Automata
Sort
View
FAST
2008
14 years 1 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
MICCAI
2006
Springer
14 years 12 months ago
Boosting and Nonparametric Based Tracking of Tagged MRI Cardiac Boundaries
Abstract. In this paper we present an accurate cardiac boundary tracking method for 2D tagged MRI time sequences. This method naturally integrates the motion and the static local a...
Zhen Qian, Dimitris N. Metaxas, Leon Axel
DATE
2005
IEEE
106views Hardware» more  DATE 2005»
14 years 4 months ago
SAT-Based Complete Don't-Care Computation for Network Optimization
This paper describes an improved approach to Boolean network optimization using internal don’t-cares. The improvements concern the type of don’t-cares computed, their scope, a...
Alan Mishchenko, Robert K. Brayton
PERCOM
2010
ACM
14 years 28 days ago
Collaborative real-time speaker identification for wearable systems
We present an unsupervised speaker identification system for personal annotations of conversations and meetings. The system dynamically learns new speakers and recognizes already k...
Mirco Rossi, Oliver Amft, Martin Kusserow, Gerhard...
ICRA
2009
IEEE
83views Robotics» more  ICRA 2009»
14 years 5 months ago
Real-time correlative scan matching
— Scan matching, the problem of registering two laser scans in order to determine the relative positions from which the scans were obtained, is one of the most heavily relied-upo...
Edwin B. Olson