Sciweavers

2421 search results - page 58 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
127
Voted
RAS
2002
105views more  RAS 2002»
15 years 3 months ago
Visually guided manipulation tasks
In this paper, we present a framework for a robotic system with the ability to perform real-world manipulation tasks. The complexity of such tasks determines the precision and fre...
Danica Kragic, Lars Petersson, Henrik I. Christens...
115
Voted
ICSE
1999
IEEE-ACM
15 years 7 months ago
Using a Goal-Driven Approach to Generate Test Cases for GUIs
The widespread use of GUIs for interacting with software is leading to the construction of more and more complex GUIs. With the growing complexity comes challenges in testing the ...
Atif M. Memon, Martha E. Pollack, Mary Lou Soffa
ICDE
1993
IEEE
118views Database» more  ICDE 1993»
15 years 7 months ago
Entity Identification in Database Integration
The objective of entity identification is to determine the correspondence between object instances from more than one database. This paper ezamines the problem at the instance lev...
Ee-Peng Lim, Jaideep Srivastava, Satya Prabhakar, ...
PR
2007
134views more  PR 2007»
15 years 2 months ago
An elastic partial shape matching technique
We consider the problem of partial shape matching. We propose to transform shapes into sequences and utilize an algorithm that determines a subsequence of a target sequence that b...
Longin Jan Latecki, Vasileios Megalooikonomou, Qia...
FPL
1998
Springer
99views Hardware» more  FPL 1998»
15 years 7 months ago
Exploiting Contemporary Memory Techniques in Reconfigurable Accelerators
This paper discusses the memory interface of custom computing machines. We present a high speed parallel memory for the MoM-PDA machine, which is based on the Xputer paradigm. The ...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...