Sciweavers

1587 search results - page 89 / 318
» What's my method
Sort
View
COMPSAC
2006
IEEE
14 years 5 months ago
Just Enough Requirements Traceability
Even though traceability is legally required in most safety critical software applications and is a recognized component of many software process improvement initiatives, organiza...
Jane Cleland-Huang
ICRA
2005
IEEE
106views Robotics» more  ICRA 2005»
14 years 4 months ago
Goal-Directed Imitation in a Humanoid Robot
Abstract— Our work aims at developing a robust discriminant controller for robot programming by demonstration. It addresses two core issues of imitation learning, namely “what to...
Sylvain Calinon, Florent Guenter, Aude Billard
JAIHC
2010
134views more  JAIHC 2010»
13 years 9 months ago
Towards a new human-centred computing methodology for cooperative ambient intelligence
Cooperative ambient intelligence aims to improve users’ work and private life by analysing their current situation with a special focus on their social interaction and to adapt t...
Tom Gross
ICPR
2008
IEEE
14 years 5 months ago
Qualitative analysis of spatio-temporal event detectors
Interest point detection is an established method to select relevent image regions. Such techniques use features like corners or edges, which are known to indicate regions likely ...
Benedikt Kaiser, Gunther Heidemann
FUIN
2006
160views more  FUIN 2006»
13 years 11 months ago
Behavioral Pattern Identification Through Rough Set Modeling
This paper introduces an approach to behavioral pattern identification as a part of a study of temporal patterns in complex dynamical systems. Rough set theory introduced by Zdzisl...
Jan G. Bazan