Sciweavers

1472 search results - page 294 / 295
» Technique Integration for Requirements Assessment
Sort
View
109
Voted
ICRA
2010
IEEE
222views Robotics» more  ICRA 2010»
15 years 11 days ago
Pose estimation in heavy clutter using a multi-flash camera
We propose a novel solution to object detection, localization and pose estimation with applications in robot vision. The proposed method is especially applicable when the objects ...
Ming-Yu Liu, Oncel Tuzel, Ashok Veeraraghavan, Ram...
182
Voted
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
15 years 6 days ago
Automatically Inferring ClassSheet Models from Spreadsheets
Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, d...
Jacome Cunha, Martin Erwig, Joao Saraiva
171
Voted
ISW
2010
Springer
14 years 11 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ISCA
2011
IEEE
365views Hardware» more  ISCA 2011»
14 years 5 months ago
Kilo-NOC: a heterogeneous network-on-chip architecture for scalability and service guarantees
Today’s chip-level multiprocessors (CMPs) feature up to a hundred discrete cores, and with increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specia...
Boris Grot, Joel Hestness, Stephen W. Keckler, Onu...
SMA
2009
ACM
132views Solid Modeling» more  SMA 2009»
15 years 8 months ago
Robust Voronoi-based curvature and feature estimation
Many algorithms for shape analysis and shape processing rely on accurate estimates of differential information such as normals and curvature. In most settings, however, care must...
Quentin Mérigot, Maks Ovsjanikov, Leonidas ...