Sciweavers

1518 search results - page 169 / 304
» Cryptographic Test Correction
Sort
View
118
Voted
ICRA
2000
IEEE
139views Robotics» more  ICRA 2000»
15 years 5 months ago
Appearance-Based Place Recognition for Topological Localization
This paper presents a new appearance-based place recognition system for topological localization. The method uses a panoramic vision system to sense the environment. Color images ...
Iwan Ulrich, Illah R. Nourbakhsh
ECRTS
1999
IEEE
15 years 5 months ago
Timed automaton models for simple programmable logic controllers
We give timed automaton models for a class of Programmable Logic Controller (PLC) applications, that are programmed in a simple fragment of the language Instruction Lists as defin...
Angelika Mader, Hanno Wupper
125
Voted
DL
1999
Springer
187views Digital Library» more  DL 1999»
15 years 5 months ago
KEA: Practical Automatic Keyphrase Extraction
Keyphrases provide semantic metadata that summarize and characterize documents. This paper describes Kea, an algorithm for automatically extracting keyphrases from text. Kea ident...
Ian H. Witten, Gordon W. Paynter, Eibe Frank, Carl...
99
Voted
VLSID
1999
IEEE
97views VLSI» more  VLSID 1999»
15 years 5 months ago
A New Methodology for Concurrent Technology Development and Cell Library Optimization
To minimize the time to market and cost of new sub 0.25um process technologies and products, PDF Solutions, Inc., has developed a new comprehensive approach based on the use of pr...
Marko P. Chew, Sharad Saxena, Thomas F. Cobourn, P...
110
Voted
PPSN
1998
Springer
15 years 5 months ago
On Risky Methods for Local Selection under Noise
The choice of the selection method used in an evolutionary algorithm may have considerable impacts on the behavior of the entire algorithm. Therefore, earlier work was devoted to t...
Günter Rudolph