Sciweavers

144227 search results - page 141 / 28846
» Using
Sort
View
90
Voted
SP
2000
IEEE
15 years 7 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
ECAI
2000
Springer
15 years 7 months ago
Using Description Logics for Ontology Extraction
The paper presents a prototype of a system for querying the Web in natural language (French) for a limited domain. The domain knowledge, represented in description logics (DL), is ...
Amalia Todirascu, François de Bertrand de B...
DATE
1999
IEEE
102views Hardware» more  DATE 1999»
15 years 7 months ago
Minimal Length Diagnostic Tests for Analog Circuits using Test History
In this paper we propose an efficient transient test generation method to comprehensively test analog circuits using minimum test time. A divide and conquer strategy is formulated...
Alfred V. Gomes, Abhijit Chatterjee
134
Voted
DEXAW
1999
IEEE
176views Database» more  DEXAW 1999»
15 years 7 months ago
Windsurf: Region-Based Image Retrieval Using Wavelets
In this paper we present WINDSURF (Wavelet-Based Indexing of Images Using Region Fragmentation), a new approach to content-based image retrieval. The method uses the wavelet trans...
Stefania Ardizzoni, Ilaria Bartolini, Marco Patell...
113
Voted
ICRA
1999
IEEE
107views Robotics» more  ICRA 1999»
15 years 6 months ago
Hybrid Control for Biped Robots Using Impedance Control and Computed-Torque Control
This paper proposes a hybrid control method of using the impedance control and the computed-torque control for biped robot locomotion. The computedtorque control is used for suppo...
Jong H. Park, Ho A. Chung
« Prev « First page 141 / 28846 Last » Next »