Sciweavers

7134 search results - page 1235 / 1427
» A comparative study of map use
Sort
View
96
Voted
ATAL
2008
Springer
15 years 2 months ago
Negotiating task interruptions with virtual agents for health behavior change
Virtual health counseling agents on mobile devices need to be able to interrupt their users when it is time for them to engage in healthy behaviors, such as scheduled medication t...
Timothy W. Bickmore, Daniel Mauer, Francisco Cresp...
AVSS
2008
IEEE
15 years 2 months ago
Evaluation of Background Subtraction Algorithms with Post-Processing
Processing a video stream to segment foreground objects from the background is a critical first step in many computer vision applications. Background subtraction (BGS) is a common...
Donovan H. Parks, Sidney Fels
CCS
2008
ACM
15 years 2 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CDC
2008
IEEE
192views Control Systems» more  CDC 2008»
15 years 2 months ago
Distributed coordination algorithms for multiple fractional-order systems
Abstract-- This paper studies distributed coordination algorithms for multiple fractional-order systems over a directed communication graph. A general fractional-order consensus mo...
Yongcan Cao, Yan Li, Wei Ren, Yangquan Chen
125
Voted
DSN
2005
IEEE
15 years 2 months ago
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors
Soft errors are a growing concern for processor reliability. Recent work has motivated architecture-level studies of soft errors since the architecture can mask many raw errors an...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
« Prev « First page 1235 / 1427 Last » Next »