Sciweavers

703 search results - page 90 / 141
» Using Cases Utility for Heuristic Planning Improvement
Sort
View
ICRA
2006
IEEE
87views Robotics» more  ICRA 2006»
14 years 1 months ago
Learning to Predict Slip for Ground Robots
— In this paper we predict the amount of slip an exploration rover would experience using stereo imagery by learning from previous examples of traversing similar terrain. To do t...
Anelia Angelova, Larry Matthies, Daniel M. Helmick...
IPPS
2007
IEEE
14 years 2 months ago
New Results on the Performance Effects of Autocorrelated Flows in Systems
Temporal dependence within the workload of any computing or networking system has been widely recognized as a significant factor affecting performance. More specifically, burstin...
Evgenia Smirni, Qi Zhang, Ningfang Mi, Alma Riska,...
TMC
2010
179views more  TMC 2010»
13 years 6 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
14 years 13 days ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
13 years 11 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis