Sciweavers

275 search results - page 51 / 55
» Using Randomized Caches in Probabilistic Real-Time Systems
Sort
View
MM
2005
ACM
139views Multimedia» more  MM 2005»
14 years 1 months ago
Multimodal affect recognition in learning environments
We propose a multi-sensor affect recognition system and evaluate it on the challenging task of classifying interest (or disinterest) in children trying to solve an educational pu...
Ashish Kapoor, Rosalind W. Picard
APPROX
2007
Springer
86views Algorithms» more  APPROX 2007»
13 years 11 months ago
Lower Bounds for Swapping Arthur and Merlin
We prove a lower bound for swapping the order of Arthur and Merlin in two-round MerlinArthur games using black-box techniques. Namely, we show that any AM-game requires time (t2 )...
Scott Diehl
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
14 years 2 months ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...
TVCG
2010
151views more  TVCG 2010»
13 years 6 months ago
Uncertainty-Aware Guided Volume Segmentation
—Although direct volume rendering is established as a powerful tool for the visualization of volumetric data, efficient and reliable feature detection is still an open topic. Us...
Jörg-Stefan Praßni, Timo Ropinski, Klau...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 2 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...