Sciweavers

5687 search results - page 1003 / 1138
» Visualizing Evaluation in Scheme
Sort
View
ICRA
2010
IEEE
147views Robotics» more  ICRA 2010»
13 years 7 months ago
A novel framework for closed-loop robotic motion simulation - part II: Motion cueing design and experimental validation
— This paper, divided in two Parts, considers the problem of realizing a 6-DOF closed-loop motion simulator by exploiting an anthropomorphic serial manipulator as motion platform...
Paolo Robuffo Giordano, Carlo Masone, Joachim Tesc...
IEEECIT
2010
IEEE
13 years 7 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
IJON
2010
150views more  IJON 2010»
13 years 7 months ago
Linear discriminant analysis using rotational invariant L1 norm
Linear Discriminant Analysis (LDA) is a well-known scheme for supervised subspace learning. It has been widely used in the applications of computer vision and pattern recognition....
Xi Li, Weiming Hu, Hanzi Wang, Zhongfei Zhang
INFOCOM
2010
IEEE
13 years 7 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
IVA
2010
Springer
13 years 7 months ago
Smart Events and Primed Agents
We describe a new organization for virtual human responses to dynamically occurring events. In our approach behavioral responses are enumerated in the representation of the event i...
Catherine Stocker, Libo Sun, Pengfei Huang, Wenhu ...
« Prev « First page 1003 / 1138 Last » Next »