Sciweavers

3792 search results - page 685 / 759
» Techniques for Trusted Software Engineering
Sort
View
UIST
2010
ACM
14 years 10 months ago
A framework for robust and flexible handling of inputs with uncertainty
New input technologies (such as touch), recognition based input (such as pen gestures) and next-generation interactions (such as inexact interaction) all hold the promise of more ...
Julia Schwarz, Scott E. Hudson, Jennifer Mankoff, ...
WCET
2010
14 years 10 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
130
Voted
AROBOTS
2011
14 years 7 months ago
Time-extended multi-robot coordination for domains with intra-path constraints
Abstract— Many applications require teams of robots to cooperatively execute complex tasks. Among these domains are those where successful coordination solutions must respect con...
Edward Gil Jones, M. Bernardine Dias, Anthony Sten...
117
Voted
SIAMAM
2011
14 years 7 months ago
Wave Attenuation through Multiple Rows of Scatterers with Differing Periodicities
A solution method is proposed for calculating wave scattering by a multiple-row array in which the rows are permitted to have different periodicities. Each individual row contains ...
Luke G. Bennetts
136
Voted
SIAMIS
2011
14 years 7 months ago
NESTA: A Fast and Accurate First-Order Method for Sparse Recovery
Abstract. Accurate signal recovery or image reconstruction from indirect and possibly undersampled data is a topic of considerable interest; for example, the literature in the rece...
Stephen Becker, Jérôme Bobin, Emmanue...