Sciweavers

3730 search results - page 641 / 746
» Robust design of embedded systems
Sort
View
94
Voted
ICRA
1994
IEEE
127views Robotics» more  ICRA 1994»
15 years 4 months ago
"RISC" for Industrial Robotics: Recent Results and Open Problems
At the intersection of robotics, computational geometry, and manufacturingengineering, we have identifieda collection of research problems with near-term industrial applications. ...
John F. Canny, Kenneth Y. Goldberg
110
Voted
AVSS
2007
IEEE
15 years 4 months ago
A LQR spatiotemporal fusion technique for face profile collection in smart camera surveillance
In this paper, we propose a joint face orientation estimation in smart camera networks without having to localize the cameras in advance. The system is composed of in-node coarse ...
Chung-Ching Chang, Hamid K. Aghajan
ESCIENCE
2006
IEEE
15 years 4 months ago
Soft Benchmarks-Based Application Performance Prediction Using a Minimum Training Set
Application execution time prediction is of key importance in making decisions about efficient usage of Grid resources. Grid services lack support of a generic application executi...
Farrukh Nadeem, Muhammad Murtaza Yousaf, Radu Prod...
ZUM
2000
Springer
132views Formal Methods» more  ZUM 2000»
15 years 4 months ago
A Formal Architecture for the 3APL Agent Programming Language
Abstract. The notion of agents has provided a way of imbuing traditional computing systems with an extra degree of flexibility that allows them to be more resilient and robust in t...
Mark d'Inverno, Koen V. Hindriks, Michael Luck
USENIX
2008
15 years 3 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig