Sciweavers

188 search results - page 27 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
TEI
2010
ACM
100views Hardware» more  TEI 2010»
14 years 12 months ago
Coming to grips with the objects we grasp: detecting interactions with efficient wrist-worn sensors
The use of a wrist-worn sensor that is able to read nearby RFID tags and the wearer's gestures has been suggested frequently as a way to both detect the objects we interact w...
Eugen Berlin, Jun Liu, Kristof Van Laerhoven, Bern...
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
15 years 5 months ago
An experimental study of hybrid switched system approaches to visual servoing
Abstract— In the recent past, many researchers have developed control algorithms for visual servo applications. In this paper, we introduce a new hybrid switched system approach,...
Nicholas R. Gans, Seth Hutchinson
112
Voted
NIPS
2008
15 years 1 months ago
Grouping Contours Via a Related Image
Contours have been established in the biological and computer vision literature as a compact yet descriptive representation of object shape. While individual contours provide stru...
Praveen Srinivasan, Liming Wang, Jianbo Shi
GECCO
2008
Springer
122views Optimization» more  GECCO 2008»
15 years 23 days ago
Evolving machine microprograms
The realization of a control unit can be done using a complex circuitry or microprogramming. The latter may be considered as an alternative method of implementation of machine ins...
Pedro A. Castillo Valdivieso, G. Fernández,...
CAINE
2006
15 years 1 months ago
A multiobjective evolutionary approach for constrained joint source code optimization
The synergy of software and hardware leads to efficient application expression profile (AEP) not only in terms of execution time and energy but also optimal architecture usage. We...
Naeem Zafar Azeemi