Sciweavers

5344 search results - page 269 / 1069
» Privacy-Preserving Set Operations
Sort
View
DSN
2000
IEEE
15 years 8 months ago
Software-Implemented Fault Detection for High-Performance Space Applications
We describe and test a software approach to overcoming radiation-induced errors in spaceborne applications running on commercial off-the-shelf components. The approach uses checks...
Michael J. Turmon, Robert Granat, Daniel S. Katz
ICRA
2000
IEEE
144views Robotics» more  ICRA 2000»
15 years 8 months ago
Automatic Identification of Local Geometric Properties During Teleoperation
During teleoperation, a human operator often receives only 2-D visual feedback from the remote environment. While a variety of kinematic sensors exist on the remote manipulator fo...
Thomas Debus, Pierre E. Dupont, Robert D. Howe
WMCSA
2000
IEEE
15 years 8 months ago
ARC: A Bottom-Up Approach to Negotiated QoS
Mobile systems operate in a resource-scarce environment and thus must adapt to external conditions; all layers must make cost-based decisions about what mode of operation to use i...
Hylke W. van Dijk, Koen Langendoen, Henk J. Sips
SIGDOC
2000
ACM
15 years 8 months ago
Testing documentation with "low-tech" simulation
∗ This paper introduces low-tech simulation as a technique for testing procedures and their documentation. The key idea is to test the interface-procedure-documentation set in th...
David G. Novick
APCHI
1998
IEEE
15 years 8 months ago
Warping to Enhance 3D User Interfaces
Cartoon animation techniques have previously been used to enhance the illusion of direct manipulation in 2D graphical user interfaces. In particular, animation may be used to conv...
Bruce H. Thomas