Sciweavers

5948 search results - page 1002 / 1190
» Computing Robust Counter-Strategies
Sort
View
125
Voted
CEC
2007
IEEE
15 years 10 months ago
Covariance matrix repairing in Gaussian based EDAs
— Gaussian models are widely adopted in continuous Estimation of Distribution Algorithms (EDAs). In this paper, we analyze continuous EDAs and show that they don’t always work ...
Weishan Dong, Xin Yao
120
Voted
CEC
2007
IEEE
15 years 10 months ago
Memetic algorithms for inexact graph matching
—The noise-robust matching of two graphs is a hard combinatorial problem with practical importance in several domains. In practical applications, a unique solution for a given in...
Thomas Bärecke, Marcin Detyniecki
113
Voted
CRV
2007
IEEE
127views Robotics» more  CRV 2007»
15 years 10 months ago
Extrinsic Recalibration in Camera Networks
This work addresses the practical problem of keeping a camera network calibrated during a recording session. When dealing with real-time applications, a robust calibration of the ...
Chris Hermans, Maarten Dumont, Philippe Bekaert
118
Voted
DATE
2007
IEEE
145views Hardware» more  DATE 2007»
15 years 10 months ago
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508
This paper proposes an innovative methodology to perform and validate a Failure Mode and Effects Analysis (FMEA) at System-on-Chip (SoC) level. This is done in compliance with the...
Riccardo Mariani, Gabriele Boschi, Federico Colucc...
95
Voted
DATE
2007
IEEE
99views Hardware» more  DATE 2007»
15 years 10 months ago
A non-intrusive isolation approach for soft cores
Cost effective SOC test strongly hinges on parallel, independent test of SOC cores, which can only be ensured through proper core isolation techniques. While a core isolation mech...
Ozgur Sinanoglu, Tsvetomir Petrov
« Prev « First page 1002 / 1190 Last » Next »