Sciweavers

9405 search results - page 1858 / 1881
» Computing a Model of Set Theory
Sort
View
154
Voted
CODES
2007
IEEE
15 years 10 months ago
Reliable multiprocessor system-on-chip synthesis
This article presents a multiprocessor system-on-chip synthesis (MPSoC) algorithm that optimizes system mean time to failure. Given a set of directed acyclic periodic graphs of co...
Changyun Zhu, Zhenyu (Peter) Gu, Robert P. Dick, L...
152
Voted
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
15 years 10 months ago
Stereo-based Markerless Human Motion Capture for Humanoid Robot Systems
Abstract— In this paper, we present an image-based markerless human motion capture system, intended for humanoid robot systems. The restrictions set by this ambitious goal are nu...
Pedram Azad, Ales Ude, Tamim Asfour, Rüdiger ...
132
Voted
ISBI
2007
IEEE
15 years 9 months ago
Validation of Optical-Flow for Quantification of Myocardial Deformations on Simulated Rt3d Ultrasound
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable fourdimension...
Qi Duan, Elsa D. Angelini, Shunichi Homma, Andrew ...
141
Voted
ISPASS
2007
IEEE
15 years 9 months ago
Accelerating Full-System Simulation through Characterizing and Predicting Operating System Performance
The ongoing trend of increasing computer hardware and software complexity has resulted in the increase in complexity and overheads of cycle-accurate processor system simulation, e...
Seongbeom Kim, Fang Liu, Yan Solihin, Ravi R. Iyer...
132
Voted
CCS
2007
ACM
15 years 9 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
« Prev « First page 1858 / 1881 Last » Next »