Sciweavers

1585 search results - page 232 / 317
» A framework for computer-aided validation
Sort
View
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
15 years 10 months ago
Optimizing an IT Project Portfolio with Time-Wise Interdependencies
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
IAT
2006
IEEE
15 years 10 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
ICRA
2006
IEEE
149views Robotics» more  ICRA 2006»
15 years 9 months ago
On Learning the Statistical Representation of a Task and Generalizing it to Various Contexts
— This paper presents an architecture for solving generically the problem of extracting the constraints of a given task in a programming by demonstration framework and the problem...
Sylvain Calinon, Florent Guenter, Aude Billard
116
Voted
ICRA
2006
IEEE
150views Robotics» more  ICRA 2006»
15 years 9 months ago
Navigation of Unmanned Marine Vehicles in Accordance with the Rules of the Road
Abstract— This paper is concerned with the in-field autonomous operation of unmanned marine vehicles in accordance with convention for safe and proper collision avoidance as pre...
Michael R. Benjamin, Joseph A. Curcio, John J. Leo...
IPPS
2006
IEEE
15 years 9 months ago
Modeling malware propagation in Gnutella type peer-to-peer networks
A key emerging and popular communication paradigm, primarily employed for information dissemination, is peer-to-peer (P2P) networking. In this paper, we model the spread of malwar...
Krishna K. Ramachandran, Biplab Sikdar