Sciweavers

2740 search results - page 277 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
108
Voted
SASO
2009
IEEE
15 years 10 months ago
Teleological Software Adaptation
—We examine the use of teleological metareasoning for self-adaptation in game-playing software agents. The goal of our work is to develop an interactive environment in which the ...
Joshua Jones, Chris Parnin, Avik Sinharoy, Spencer...
ISBI
2007
IEEE
15 years 10 months ago
Advanced Particle Filtering for Multiple Object Tracking in Dynamic Fluorescence Microscopy Images
Quantitative analysis of dynamical processes in living cells by means of fluorescence microscopy imaging requires tracking of hundreds of bright spots in noisy image sequences. D...
Ihor Smal, Wiro J. Niessen, Erik H. W. Meijering
91
Voted
VTC
2006
IEEE
15 years 10 months ago
Channel Access Priority for Vehicle Intersection Collision Warning
— We propose an Intersection Warning Channel Access Priority (IWCAP) protocol to warn drivers of a possible collision when approaching an intersection. Our protocol operates via ...
Nader M. Rabadi, Syed Masud Mahmud
DOCENG
2006
ACM
15 years 10 months ago
Solving the simple continuous table layout problem
Automatic table layout is required in web applications. Unfortunately, this is NP-hard for reasonable layout requirements such as minimizing table height for a given width. One ap...
Nathan Hurst, Kim Marriott, David W. Albrecht
DATE
2005
IEEE
116views Hardware» more  DATE 2005»
15 years 9 months ago
Uniformly-Switching Logic for Cryptographic Hardware
Recent work on Differential Power Analysis shows that even mathematically-secure cryptographic protocols may be vulnerable at the physical implementation level. By measuring energ...
Igor L. Markov, Dmitri Maslov