Sciweavers

3555 search results - page 554 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FLAIRS
2009
15 years 1 months ago
Analyzing Team Actions with Cascading HMM
While team action recognition has a relatively extended literature, less attention has been given to the detailed realtime analysis of the internal structure of the team actions. ...
Brandyn Allen White, Nate Blaylock, Ladislau B&oum...
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 11 months ago
On Communication over Unknown Sparse Frequency-Selective Block-Fading Channels
The problem of reliable communication over unknown frequency-selective block-fading channels with sparse impulse responses is considered. In particular, discrete-time impulse respo...
Arun Pachai Kannu, Philip Schniter
116
Voted
ICIP
2008
IEEE
15 years 10 months ago
Breast contour detection with shape priors
Breast cancer conservative treatment (BCCT) is considered the gold standard of breast cancer treatment. However, aesthetic results are heterogeneous and difficult to evaluate in ...
Ricardo Sousa, Jaime S. Cardoso, Joaquim F. Pinto ...
IPPS
2008
IEEE
15 years 10 months ago
Lattice Boltzmann simulation optimization on leading multicore platforms
We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of searchbased performance optimizatio...
Samuel Williams, Jonathan Carter, Leonid Oliker, J...
129
Voted
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
15 years 10 months ago
Model-Based Nonlinear Observers for Underwater Vehicle Navigation: Theory and Preliminary Experiments
— This paper reports the analytical development and preliminary experimental evaluation of a class of exact nonlinear full state model-based observers for underwater vehicle navi...
James C. Kinsey, Louis L. Whitcomb