Sciweavers

7529 search results - page 1352 / 1506
» The Modula-3 Type System
Sort
View
TROB
2008
86views more  TROB 2008»
15 years 4 months ago
Visual SLAM for Flying Vehicles
The ability to learn a map of the environment is important for numerous types of robotic vehicles. In this paper, we address the problem of learning a visual map of the ground usin...
Bastian Steder, Giorgio Grisetti, Cyrill Stachniss...
147
Voted
TSE
2008
128views more  TSE 2008»
15 years 4 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
163
Voted
TSMC
2008
172views more  TSMC 2008»
15 years 4 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
JOT
2007
138views more  JOT 2007»
15 years 4 months ago
Flexible Language Interoperability
machines raise the abstraction level of the execution environment at the cost of restricting the set of supported languages. Moreover, the ability of a language implementation to i...
Torbjörn Ekman, Peter Mechlenborg, Ulrik Pagh...
TSP
2008
83views more  TSP 2008»
15 years 4 months ago
Bit and Power Allocation for Goodput Optimization in Coded Parallel Subchannels With ARQ
Abstract--This paper addresses the problem of adaptively allocating the bits and the power among a set of parallel subchannels. A frame-oriented transmission with convolutional cod...
B. Devillers, Jérôme Louveaux, Luc Va...
« Prev « First page 1352 / 1506 Last » Next »