Sciweavers

5948 search results - page 232 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICPR
2002
IEEE
15 years 9 months ago
A Robust Algorithm for Probabilistic Human Recognition From
Human recognition from video requires solving the two tasks, recognition and tracking, simultaneously. This leads to a parameterized time series state space model, representing bo...
Shaohua Kevin Zhou, Rama Chellappa
BPM
2000
Springer
111views Business» more  BPM 2000»
15 years 8 months ago
A Knowledge-Based Approach for Designing Robust Business Processes
This chapter describes a novel knowledge-based methodology and computer toolset for helping business process designers and participants better manage exceptions (unexpected deviati...
Chrysanthos Dellarocas, Mark Klein
116
Voted
ICRA
1998
IEEE
110views Robotics» more  ICRA 1998»
15 years 8 months ago
Generating Robust Trajectories in the Presence of Ordinary and Linear-Self-Motion Singularities
An algorithm is presented which computes feasible manipulator trajectories along fixed paths in the presence of kinematic singularities. The resulting trajectories are close to mi...
John E. Lloyd, Vincent Hayward
LCR
2000
Springer
172views System Software» more  LCR 2000»
15 years 7 months ago
Achieving Robust, Scalable Cluster I/O in Java
We present Tigris, a high-performance computation and I/O substrate for clusters of workstations that is implemented entirely in Java. Tigris automatically balances resource load a...
Matt Welsh, David E. Culler
130
Voted
USENIX
2003
15 years 5 months ago
Robust, Portable I/O Scheduling with the Disk Mimic
We propose a new approach for I/O scheduling that performs on-line simulation of the underlying disk. When simulation is integrated within a system, three key challenges must be a...
Florentina I. Popovici, Andrea C. Arpaci-Dusseau, ...