Sciweavers

903 search results - page 70 / 181
» Usability inspection methods
Sort
View
TACAS
2010
Springer
225views Algorithms» more  TACAS 2010»
15 years 5 months ago
Automated Termination Analysis for Programs with Second-Order Recursion
Many algorithms on data structures such as terms (finitely branching trees) are naturally implemented by second-order recursion: A first-order procedure f passes itself as an arg...
Markus Aderhold
66
Voted
ICRA
2007
IEEE
126views Robotics» more  ICRA 2007»
15 years 4 months ago
Incremental Spectral Clustering and Its Application To Topological Mapping
Abstract— This paper presents a novel use of spectral clustering algorithms to support cases where the entries in the affinity matrix are costly to compute. The method is increm...
Christoffer Valgren, Tom Duckett, Achim J. Lilient...
73
Voted
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
15 years 3 months ago
Shape, Motion, and Parameter Estimation of Large Flexible Space Structures using Range Images
– Future space missions are expected to use robotic systems to assemble, inspect, and maintain large space structures in orbit. To carry out these tasks, robots need to know the ...
Matthew D. Lichter, Steven Dubowsky
IWSOC
2003
IEEE
99views Hardware» more  IWSOC 2003»
15 years 3 months ago
Template Generation and Selection Algorithms
The availability of high-level design entry tooling is crucial for the viability of any reconfigurable SoC architecture. This paper presents a template generation method to extra...
Yuanqing Guo, Gerard J. M. Smit, Hajo Broersma, Pa...
70
Voted
AVBPA
2003
Springer
140views Biometrics» more  AVBPA 2003»
15 years 3 months ago
Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images
A feature extraction method using the chaincode representation of fingerprint ridge contours is presented for use by Automatic Fingerprint Identification Systems. The representa...
Venu Govindaraju, Zhixin Shi, John Schneider