Sciweavers

166 search results - page 33 / 34
» Trust-Region Methods for Real-Time Tracking
Sort
View
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 29 days ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
SIGMOD
1993
ACM
163views Database» more  SIGMOD 1993»
13 years 11 months ago
The LRU-K Page Replacement Algorithm For Database Disk Buffering
This paper introduces a new approach to database disk buffering, called the LRU–K method. The basic idea of LRU–K is to keep track of the times of the last K references to pop...
Elizabeth J. O'Neil, Patrick E. O'Neil, Gerhard We...
INFFUS
2007
107views more  INFFUS 2007»
13 years 7 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
EMSOFT
2007
Springer
14 years 1 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant
HRI
2006
ACM
14 years 1 months ago
Daily HRI evaluation at a classroom environment: reports from dance interaction experiments
The design and development of social robots that interact and assist people in daily life requires moving into unconstrained daily-life environments. This presents unexplored meth...
Fumihide Tanaka, Javier R. Movellan, Bret Fortenbe...