Sciweavers

331 search results - page 60 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
MICCAI
2010
Springer
14 years 9 months ago
Micro-force Sensing in Robot Assisted Membrane Peeling for Vitreoretinal Surgery
Abstract. Vitreoretinal surgeons use 0.5mm diameter instruments to manipulate delicate tissue inside the eye while applying imperceptible forces that can cause damage to the retina...
Marcin Balicki, Ali Uneri, Iulian Iordachita, Jame...
ICANN
2009
Springer
14 years 8 months ago
Mental Tasks Classification for a Noninvasive BCI Application
Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for...
Alexandre Ormiga G. Barbosa, David Ronald A. Diaz,...
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 6 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
120
Voted
GECCO
2011
Springer
261views Optimization» more  GECCO 2011»
14 years 2 months ago
Spacing memetic algorithms
We introduce the Spacing Memetic Algorithm (SMA), a formal evolutionary model devoted to a systematic control of spacing (distances) among individuals. SMA uses search space dista...
Daniel Cosmin Porumbel, Jin-Kao Hao, Pascale Kuntz
SDM
2012
SIAM
307views Data Mining» more  SDM 2012»
13 years 1 months ago
Pseudo Cold Start Link Prediction with Multiple Sources in Social Networks
Link prediction is an important task in social networks and data mining for understanding the mechanisms by which the social networks form and evolve. In most link prediction rese...
Liang Ge, Aidong Zhang