Sciweavers

575 search results - page 115 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
EJC
2008
13 years 7 months ago
Center Fragments for Upscaling and Verification in Database Semantics
The notion of a fragment was coined by Montague 1974 to illustrate the formal handling of certain puzzles, such as de dicto/de re, in a truth-conditional semantics for natural lan...
Roland Hausser
IJDE
2007
123views more  IJDE 2007»
13 years 5 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
SIGPRO
2002
160views more  SIGPRO 2002»
13 years 5 months ago
New multiscale transforms, minimum total variation synthesis: applications to edge-preserving image reconstruction
This paper describes newly invented multiscale transforms known under the name of the ridgelet [6] and the curvelet transforms [9, 8]. These systems combine ideas of multiscale an...
Emmanuel J. Candès, Franck Guo
CONNECTION
2010
144views more  CONNECTION 2010»
13 years 3 months ago
The roles of the amygdala in the affective regulation of body, brain, and behaviour
Abstract. Despite the great amount of knowledge produced by the neuroscientific literature affective phenomena, current models tackling noncognitive aspects of behavior are often b...
Marco Mirolli, Francesco Mannella, Gianluca Baldas...
ASAP
2011
IEEE
233views Hardware» more  ASAP 2011»
12 years 5 months ago
Accelerating vision and navigation applications on a customizable platform
—The domain of vision and navigation often includes applications for feature tracking as well as simultaneous localization and mapping (SLAM). As these problems require computati...
Jason Cong, Beayna Grigorian, Glenn Reinman, Marco...