Sciweavers

2838 search results - page 353 / 568
» Verifying Controlled Components
Sort
View
AAI
1998
101views more  AAI 1998»
15 years 13 days ago
Layered Approach to Learning Client Behaviors in the Robocup Soccer Server
In the past few years, Multiagent Systems (MAS) has emerged as an active subfield of Artificial Intelligence (AI). Because of the inherent complexity of MAS, there is much inter...
Peter Stone, Manuela M. Veloso
99
Voted
IJCV
2002
102views more  IJCV 2002»
15 years 12 days ago
Relighting with the Reflected Irradiance Field: Representation, Sampling and Reconstruction
Image-based relighting (IBL) is a technique to change the illumination of an image-based object/scene. In this paper, we define a representation called the reflected irradiance fi...
Zhouchen Lin, Tien-Tsin Wong, Heung-Yeung Shum
JCS
2002
115views more  JCS 2002»
15 years 12 days ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
TON
1998
87views more  TON 1998»
15 years 11 days ago
Adaptive hybrid clock discipline algorithm for the network time protocol
This paper describes the analysis, implementation and performance of a new algorithm engineered to discipline a computer clock to a source of standard time, such as a GPS receiver...
David L. Mills
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 8 days ago
MRI/TRUS data fusion for brachytherapy
Background: Prostate brachytherapy consists in placing radioactive seeds for tumour destruction under transrectal ultrasound imaging (TRUS) control. It requires prostate delineati...
Vincent Daanen, J. Gastaldo, Jean-Yves Giraud, Phi...