Sciweavers

1548 search results - page 250 / 310
» Estimating Software Vulnerabilities
Sort
View
CODES
2008
IEEE
14 years 11 months ago
Methodology for multi-granularity embedded processor power model generation for an ESL design flow
With power becoming a major constraint for multi-processor embedded systems, it is becoming important for designers to characterize and model processor power dissipation. It is cr...
Young-Hwan Park, Sudeep Pasricha, Fadi J. Kurdahi,...
QOSA
2010
Springer
14 years 9 months ago
Using QoS-Contracts to Drive Architecture-Centric Self-adaptation
Self-adaptation is now a promising approach to maximize the satisfaction of requirements under changing environmental conditions. One of the key challenges for such self-adaptive s...
Franck Chauvel, Hui Song, Xiangping Chen, Gang Hua...
CISIS
2009
IEEE
14 years 9 months ago
Simultaneous Background/Foreground Segmentation and Contour Smoothing with Level Set Based Partial Differential Equation for Int
In this paper, we propose a level set based energy functional, the minimization of which results in simultaneous background modeling, foreground segmentation, and contour smoothin...
Suk Ho Lee, Nam-seok Choi, Byung-Gook Lee, Moon Gi...
AROBOTS
2011
14 years 6 months ago
Learning GP-BayesFilters via Gaussian process latent variable models
Abstract— GP-BayesFilters are a general framework for integrating Gaussian process prediction and observation models into Bayesian filtering techniques, including particle filt...
Jonathan Ko, Dieter Fox
AROBOTS
2011
14 years 6 months ago
Human motion database with a binary tree and node transition graphs
— Database of human motion has been widely used for recognizing human motion and synthesizing humanoid motions. In this paper, we propose a data structure for storing and extract...
Katsu Yamane, Yoshifumi Yamaguchi, Yoshihiko Nakam...