Sciweavers

10625 search results - page 1834 / 2125
» Supporting delay-intolerant applications
Sort
View
KBSE
2009
IEEE
15 years 5 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
ICDCSW
2009
IEEE
15 years 5 months ago
An Approach to Middleware Specialization for Cyber Physical Systems
Contemporary computing infrastructure, such as networking stacks, OS and middleware, are made up of layers of software functionality that have evolved over decades to support the ...
Akshay Dabholkar, Aniruddha S. Gokhale
ICEIS
2009
IEEE
15 years 5 months ago
NARFO Algorithm: Mining Non-redundant and Generalized Association Rules Based on Fuzzy Ontologies
Traditional approaches for mining generalized association rules are based only on database contents, and focus on exact matches among items. However, in many applications, the use ...
Rafael Garcia Miani, Cristiane A. Yaguinuma, Maril...
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
15 years 5 months ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...
ICRA
2009
IEEE
121views Robotics» more  ICRA 2009»
15 years 5 months ago
Learning sequential visual attention control through dynamic state space discretization
² Similar to humans and primates, artificial creatures like robots are limited in terms of allocation of their resources to huge sensory and perceptual information. Serial process...
Ali Borji, Majid Nili Ahmadabadi, Babak Nadjar Ara...
« Prev « First page 1834 / 2125 Last » Next »