Sciweavers

586 search results - page 18 / 118
» Comparing Three Computational Models of Affect
Sort
View
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 4 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
CLOR
2006
15 years 2 months ago
Components for Object Detection and Identification
We present a component-based system for object detection and identification. From a set of training images of a given object we extract a large number of components which are clust...
Bernd Heisele, Ivaylo Riskov, Christian Morgenster...
BMCBI
2006
123views more  BMCBI 2006»
14 years 11 months ago
Computational models with thermodynamic and composition features improve siRNA design
Background: Small interfering RNAs (siRNAs) have become an important tool in cell and molecular biology. Reliable design of siRNA molecules is essential for the needs of large fun...
Svetlana A. Shabalina, Alexey N. Spiridonov, Aleks...
80
Voted
AAAI
2007
15 years 1 months ago
Towards a Cognitive Model of Crowd Behavior Based on Social Comparison Theory
Models of crowd behavior facilitate analysis and prediction of human group behavior, where people are affected by each other’s presence. Unfortunately, existing models leave man...
Natalie Fridman, Gal A. Kaminka
FORMATS
2006
Springer
15 years 2 months ago
Model Checking Timed Automata with Priorities Using DBM Subtraction
In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic ...
Alexandre David, John Håkansson, Kim Guldstr...