Sciweavers

861 search results - page 61 / 173
» Predicting Attack-prone Components
Sort
View
ICRA
2006
IEEE
99views Robotics» more  ICRA 2006»
15 years 6 months ago
Application of Set Membership Identification for Fault Detection of MEMS
- In this article, a set membership (SM) identification technique is tailored to detect faults in microelectromechanical systems. The SM-identifier estimates an orthotope which con...
Vasso Reppa, Anthony Tzes
WOSS
2004
ACM
15 years 6 months ago
A control-based framework for self-managing distributed computing systems
This paper describes an online control framework to design self-managing distributed computing systems that continually optimize their performance in response to changing computin...
Sherif Abdelwahed, Nagarajan Kandasamy, Sandeep Ne...
89
Voted
PR
2007
194views more  PR 2007»
15 years 9 days ago
Decolorize: Fast, contrast enhancing, color to grayscale conversion
We present a new contrast enhancing color to grayscale conversion algorithm which works in real-time. It incorporates novel techniques for image sampling and dimensionality reduct...
Mark Grundland, Neil A. Dodgson
100
Voted
GECCO
2006
Springer
196views Optimization» more  GECCO 2006»
15 years 4 months ago
An anticipatory approach to improve XCSF
XCSF is a novel version of learning classifier systems (LCS) which extends the typical concept of LCS by introducing computable classifier prediction. In XCSF Classifier predictio...
Amin Nikanjam, Adel Torkaman Rahmani
89
Voted
DATE
2008
IEEE
128views Hardware» more  DATE 2008»
15 years 7 months ago
Robust and Low Complexity Rate Control for Solar Powered Sensors
This paper is concerned with solar driven sensors deployed in an outdoor environment. We present feedback controllers which adapt parameters of the application such that a maximal...
Clemens Moser, Lothar Thiele, Davide Brunelli, Luc...