Sciweavers

4781 search results - page 712 / 957
» Complexity at large
Sort
View
SWARM
2008
SPRINGER
115views Optimization» more  SWARM 2008»
15 years 20 days ago
Path formation in a robot swarm
We present two swarm intelligence control mechanisms used for distributed robot path formation. In the first, the robots form linear chains. We study three variants of robot chains...
Shervin Nouyan, Alexandre Campo, Marco Dorigo
TCAD
2008
103views more  TCAD 2008»
15 years 19 days ago
Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems
Latency-insensitive protocols allow system-on-chip (SoC) engineers to decouple the design of the computing cores from the design of the intercore communication channels while follo...
Rebecca L. Collins, Luca P. Carloni
TCSV
2008
143views more  TCSV 2008»
15 years 19 days ago
High-Speed Action Recognition and Localization in Compressed Domain Videos
We present a compressed domain scheme that is able to recognize and localize actions in real-time1 . The recognition problem is posed as performing an action video query on a test ...
Chuohao Yeo, Parvez Ahammad, Kannan Ramchandran, S...
116
Voted
TCSV
2008
150views more  TCSV 2008»
15 years 19 days ago
Mining Recurring Events Through Forest Growing
Recurring events are short temporal patterns that consist of multiple instances in the target database. Without any a priori knowledge of the recurring events, in terms of their le...
Junsong Yuan, Jingjing Meng, Ying Wu, Jiebo Luo
TIFS
2008
109views more  TIFS 2008»
15 years 19 days ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...