Sciweavers

1472 search results - page 294 / 295
» Technique Integration for Requirements Assessment
Sort
View
ICRA
2010
IEEE
222views Robotics» more  ICRA 2010»
13 years 5 months ago
Pose estimation in heavy clutter using a multi-flash camera
We propose a novel solution to object detection, localization and pose estimation with applications in robot vision. The proposed method is especially applicable when the objects ...
Ming-Yu Liu, Oncel Tuzel, Ashok Veeraraghavan, Ram...
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
13 years 5 months ago
Automatically Inferring ClassSheet Models from Spreadsheets
Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, d...
Jacome Cunha, Martin Erwig, Joao Saraiva
ISW
2010
Springer
13 years 4 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ISCA
2011
IEEE
365views Hardware» more  ISCA 2011»
12 years 10 months ago
Kilo-NOC: a heterogeneous network-on-chip architecture for scalability and service guarantees
Today’s chip-level multiprocessors (CMPs) feature up to a hundred discrete cores, and with increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specia...
Boris Grot, Joel Hestness, Stephen W. Keckler, Onu...
SMA
2009
ACM
132views Solid Modeling» more  SMA 2009»
14 years 1 months ago
Robust Voronoi-based curvature and feature estimation
Many algorithms for shape analysis and shape processing rely on accurate estimates of differential information such as normals and curvature. In most settings, however, care must...
Quentin Mérigot, Maks Ovsjanikov, Leonidas ...