Sciweavers

975 search results - page 194 / 195
» Applying Patterns during Business Process Modeling
Sort
View
JFR
2007
144views more  JFR 2007»
13 years 4 months ago
Real-Time SLAM with Octree Evidence Grids for Exploration in Underwater Tunnels
We describe a Simultaneous Localization and Mapping (SLAM) method for a hovering underwater vehicle that will explore underwater caves and tunnels, a true three dimensional (3D) e...
Nathaniel Fairfield, George Kantor, David Wettergr...
JAIR
2010
142views more  JAIR 2010»
13 years 3 months ago
Context-based Word Acquisition for Situated Dialogue in a Virtual World
To tackle the vocabulary problem in conversational systems, previous work has applied unsupervised learning approaches on co-occurring speech and eye gaze during interaction to au...
Shaolin Qu, Joyce Yue Chai
COMCOM
2011
12 years 11 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
ACSAC
2004
IEEE
13 years 8 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
TNN
2010
234views Management» more  TNN 2010»
12 years 11 months ago
Novel maximum-margin training algorithms for supervised neural networks
This paper proposes three novel training methods, two of them based on the back-propagation approach and a third one based on information theory for Multilayer Perceptron (MLP) bin...
Oswaldo Ludwig, Urbano Nunes