Sciweavers

2702 search results - page 540 / 541
» Message from the Editor
Sort
View
HRI
2012
ACM
12 years 25 days ago
Designing persuasive robots: how robots might persuade people using vocal and nonverbal cues
Social robots have to potential to serve as personal, organizational, and public assistants as, for instance, diet coaches, teacher’s aides, and emergency respondents. The succe...
Vijay Chidambaram, Yueh-Hsuan Chiang, Bilge Mutlu
VLDB
2012
ACM
360views Database» more  VLDB 2012»
12 years 24 days ago
An adaptive updating protocol for reducing moving object database workload
In the last decade, spatio-temporal database research focuses on the design of effective and efficient indexing structures in support of location-based queries such as predictive...
Su Chen, Beng Chin Ooi, Zhenjie Zhang
CVPR
2012
IEEE
11 years 7 months ago
A tiered move-making algorithm for general pairwise MRFs
A large number of problems in computer vision can be modeled as energy minimization problems in a markov random field (MRF) framework. Many methods have been developed over the y...
Vibhav Vineet, Jonathan Warrell, Philip H. S. Torr
ISCA
2012
IEEE
232views Hardware» more  ISCA 2012»
11 years 7 months ago
RADISH: Always-on sound and complete race detection in software and hardware
Data-race freedom is a valuable safety property for multithreaded programs that helps with catching bugs, simplifying memory consistency model semantics, and verifying and enforci...
Joseph Devietti, Benjamin P. Wood, Karin Strauss, ...
TMC
2012
11 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...