Sciweavers

817 search results - page 138 / 164
» Malware behaviour analysis
Sort
View
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
15 years 5 months ago
Consistency of the EKF-SLAM Algorithm
— This paper presents an analysis of the extended Kalman filter formulation of simultaneous localisation and mapping (EKF-SLAM). We show that the algorithm produces very optimis...
Tim Bailey, Juan Nieto, José E. Guivant, Mi...
MM
2006
ACM
184views Multimedia» more  MM 2006»
15 years 5 months ago
Extraction of social context and application to personal multimedia exploration
Personal media collections are often viewed and managed along the social dimension, the places we spend time at and the people we see, thus tools for extracting and using this inf...
Brett Adams, Dinh Q. Phung, Svetha Venkatesh
ANCS
2005
ACM
15 years 5 months ago
Architectural impact of stateful networking applications
The explosive and robust growth of the Internet owes a lot to the ”end-to-end principle”, which pushes stateful operations to the end-points. The Internet grew both in traffic...
Javier Verdú, Jorge García-Vidal, Ma...
ADAEUROPE
2005
Springer
15 years 5 months ago
GNAT Pro for On-board Mission-Critical Space Applications
This paper describes the design and implementation of GNAT Pro for ERC32, a flexible cross-development environment supporting the Ravenscar tasking model on top of bare ERC32 comp...
José F. Ruiz
AIED
2005
Springer
15 years 5 months ago
The Use of Qualitative Reasoning Models of Interactions between Populations to Support Causal Reasoning of Deaf Students
Making inferences is crucial for understanding the world. The school may develop such skills but there are few formal opportunities for that. This paper describes an experiment de...
Paulo Salles, Heloisa Lima-Salles, Bert Bredeweg