Sciweavers

823 search results - page 63 / 165
» simulation 2011
Sort
View
143
Voted
AAAI
2011
14 years 2 months ago
Understanding Natural Language Commands for Robotic Navigation and Mobile Manipulation
This paper describes a new model for understanding natural language commands given to autonomous systems that perform navigation and mobile manipulation in semi-structured environ...
Stefanie Tellex, Thomas Kollar, Steven Dickerson, ...
132
Voted
ISCA
2011
IEEE
273views Hardware» more  ISCA 2011»
14 years 6 months ago
Bypass and insertion algorithms for exclusive last-level caches
Inclusive last-level caches (LLCs) waste precious silicon estate due to cross-level replication of cache blocks. As the industry moves toward cache hierarchies with larger inner l...
Jayesh Gaur, Mainak Chaudhuri, Sreenivas Subramone...
376
Voted
BPM
2011
Springer
270views Business» more  BPM 2011»
14 years 2 months ago
Automated Error Correction of Business Process Models
As order dependencies between process tasks can get complex, it is easy to make mistakes in process model design, especially behavioral ones such as deadlocks. Notions such as soun...
Mauro Gambini, Marcello La Rosa, Sara Migliorini, ...
149
Voted
DSN
2011
IEEE
14 years 2 months ago
Modeling time correlation in passive network loss tomography
—We consider the problem of inferring link loss rates using passive measurements. Prior inference approaches are mainly built on the time correlation nature of packet losses. How...
Jin Cao, Aiyou Chen, Patrick P. C. Lee
ICDCSW
2011
IEEE
14 years 2 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia