Sciweavers

313 search results - page 35 / 63
» Error Correction Based on Verification Techniques
Sort
View
67
Voted
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
15 years 4 months ago
A comparison of SLAM algorithms based on a graph of relations
— In this paper, we address the problem of creating an objective benchmark for comparing SLAM approaches. We propose a framework for analyzing the results of SLAM approaches base...
Wolfram Burgard, Cyrill Stachniss, Giorgio Grisett...
ICDE
2011
IEEE
220views Database» more  ICDE 2011»
14 years 1 months ago
Generating test data for killing SQL mutants: A constraint-based approach
—Complex SQL queries are widely used today, but it is rather difficult to check if a complex query has been written correctly. Formal verification based on comparing a specifi...
Shetal Shah, S. Sudarshan, Suhas Kajbaje, Sandeep ...
84
Voted
NOMS
2008
IEEE
108views Communications» more  NOMS 2008»
15 years 4 months ago
Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control
— Quality of Internet audio is highly sensitive to packet loss caused by congestion in the links. Packet loss for audio is normally rectified by adding redundancy using Forward ...
Lopa Roychoudhuri, Ehab S. Al-Shaer
CORR
2008
Springer
134views Education» more  CORR 2008»
14 years 9 months ago
Algorithmic Based Fault Tolerance Applied to High Performance Computing
: We present a new approach to fault tolerance for High Performance Computing system. Our approach is based on a careful adaptation of the Algorithmic Based Fault Tolerance techniq...
George Bosilca, Remi Delmas, Jack Dongarra, Julien...
50
Voted
ICPR
2008
IEEE
15 years 4 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang