Sciweavers

1270 search results - page 71 / 254
» IF Validation Environment Tutorial
Sort
View
131
Voted
P2P
2010
IEEE
280views Communications» more  P2P 2010»
15 years 17 days ago
Performance Evaluation of Peer-to-Peer Gaming Overlays
—In this demo we present a performance evaluation testbed for peer-to-peer gaming overlays. It consists of a 3D first person shooter game that is designed to run in a simulated ...
Max Lehn, Tonio Triebel, Cchritof Leng, Alejandro ...
141
Voted
ICPR
2010
IEEE
15 years 3 days ago
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models
In this paper, to provide a robot with information relative to structure of its environment, we propose a method to recognize types of structural corridor landmarks such as T-junct...
Youngbin Park, Sung Su Kim, Il Hong Suh
112
Voted
EICS
2009
ACM
15 years 8 months ago
Edit, inspect and connect your surroundings: a reference framework for meta-UIs
Discovering and unlocking the full potential of complex pervasive environments is still approached in application-centric ways. A set of statically deployed applications often de...
Geert Vanderhulst, Daniel Schreiber, Kris Luyten, ...
118
Voted
DAC
1998
ACM
16 years 3 months ago
Rate Derivation and Its Applications to Reactive, Real-Time Embedded Systems
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
Ali Dasdan, Dinesh Ramanathan, Rajesh K. Gupta
128
Voted
ICDE
2006
IEEE
143views Database» more  ICDE 2006»
15 years 8 months ago
Effectiveness Bounds for Non-Exhaustive Schema Matching Systems
Semantic validation of the effectiveness of a schema matching system is traditionally performed by comparing system-generated mappings with those of human evaluators. The human ef...
Marko Smiljanic, Maurice van Keulen, Willem Jonker