Sciweavers

789 search results - page 57 / 158
» Pushing using Compliance
Sort
View
JNW
2007
113views more  JNW 2007»
15 years 1 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
CHI
2011
ACM
14 years 5 months ago
Deep shot: a framework for migrating tasks across devices using mobile phone cameras
A user task often spans multiple heterogeneous devices, e.g., working on a PC in the office and continuing the work on a laptop or a mobile phone while commuting on a shuttle. How...
Tsung-Hsiang Chang, Yang Li
EUROMICRO
2009
IEEE
15 years 8 months ago
Using Design Patterns for Refactoring Real-World Models
— Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, ...
Hamed Yaghoubi Shahir, Ehsan Kouroshfar, Raman Ram...
ICPR
2008
IEEE
15 years 7 months ago
Human activities: Handling uncertainties using fuzzy time intervals
Persons may perform an activity in many different styles, or noise may cause an identical activity to have different temporal structures. We present a robust methodology for recog...
Michael S. Ryoo, Jake K. Aggarwal
ICRA
2008
IEEE
102views Robotics» more  ICRA 2008»
15 years 7 months ago
Piercing based grasping by using self-tightening effect
— This paper proposes a piercing based grasping by using the self-tightening effect of objects with elasticity. We suppose a piercing hand with palm where the piercing motion by ...
Naoki Sakamoto, Mitsuru Higashimori, Toshio Tsuji,...