Sciweavers

1548 search results - page 250 / 310
» Estimating Software Vulnerabilities
Sort
View
CODES
2008
IEEE
15 years 3 months ago
Methodology for multi-granularity embedded processor power model generation for an ESL design flow
With power becoming a major constraint for multi-processor embedded systems, it is becoming important for designers to characterize and model processor power dissipation. It is cr...
Young-Hwan Park, Sudeep Pasricha, Fadi J. Kurdahi,...
QOSA
2010
Springer
15 years 1 months ago
Using QoS-Contracts to Drive Architecture-Centric Self-adaptation
Self-adaptation is now a promising approach to maximize the satisfaction of requirements under changing environmental conditions. One of the key challenges for such self-adaptive s...
Franck Chauvel, Hui Song, Xiangping Chen, Gang Hua...
131
Voted
CISIS
2009
IEEE
15 years 1 months ago
Simultaneous Background/Foreground Segmentation and Contour Smoothing with Level Set Based Partial Differential Equation for Int
In this paper, we propose a level set based energy functional, the minimization of which results in simultaneous background modeling, foreground segmentation, and contour smoothin...
Suk Ho Lee, Nam-seok Choi, Byung-Gook Lee, Moon Gi...
186
Voted
AROBOTS
2011
14 years 10 months ago
Learning GP-BayesFilters via Gaussian process latent variable models
Abstract— GP-BayesFilters are a general framework for integrating Gaussian process prediction and observation models into Bayesian filtering techniques, including particle filt...
Jonathan Ko, Dieter Fox
205
Voted
AROBOTS
2011
14 years 10 months ago
Human motion database with a binary tree and node transition graphs
— Database of human motion has been widely used for recognizing human motion and synthesizing humanoid motions. In this paper, we propose a data structure for storing and extract...
Katsu Yamane, Yoshifumi Yamaguchi, Yoshihiko Nakam...