Sciweavers

1717 search results - page 335 / 344
» Error concealment using a diffusion based method
Sort
View
IROS
2009
IEEE
187views Robotics» more  IROS 2009»
15 years 4 months ago
Compliant quadruped locomotion over rough terrain
— Many critical elements for statically stable walking for legged robots have been known for a long time, including stability criteria based on support polygons, good foothold se...
Jonas Buchli, Mrinal Kalakrishnan, Michael Mistry,...
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
15 years 1 months ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger
CIKM
2010
Springer
14 years 8 months ago
Ranking related entities: components and analyses
Related entity finding is the task of returning a ranked list of homepages of relevant entities of a specified type that need to engage in a given relationship with a given sour...
Marc Bron, Krisztian Balog, Maarten de Rijke
TMM
2010
241views Management» more  TMM 2010»
14 years 4 months ago
Mining Compositional Features From GPS and Visual Cues for Event Recognition in Photo Collections
As digital cameras with Global Positioning System (GPS) capability become available and people geotag their photos using other means, it is of great interest to annotate semantic e...
Junsong Yuan, Jiebo Luo, Ying Wu
AH
2008
Springer
15 years 4 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson