Sciweavers

9521 search results - page 388 / 1905
» Compiling with continuations, continued
Sort
View
TSMC
2008
172views more  TSMC 2008»
15 years 4 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
TSP
2008
89views more  TSP 2008»
15 years 4 months ago
A Geometrical Study of Matching Pursuit Parametrization
This paper studies the effect of discretizing the parametrization of a dictionary in the particular context of Matching Pursuit decompositions of signals. Our approach relies on th...
Laurent Jacques, Christophe De Vleeschouwer
123
Voted
AROBOTS
2000
96views more  AROBOTS 2000»
15 years 4 months ago
Hierarchic Social Entropy: An Information Theoretic Measure of Robot Group Diversity
As research expands in multiagent intelligent systems, investigators need new tools for evaluating the artificial societies they study. It is impossible, for example, to correlate ...
Tucker R. Balch
CAD
1998
Springer
15 years 4 months ago
Tool profile and tool path calculation for free-form thick-layered fabrication
• In several application fields, large sized, free-form objects of various soft materials are widely used. Available layered prototyping technologies cannot be applied for fabri...
Imre Horváth, Joris S. M. Vergeest, Johan J...
IVC
2002
141views more  IVC 2002»
15 years 4 months ago
Real-time gesture recognition system and application
In this paper, we consider a vision-based system that can interpret a user's gestures in real time to manipulate windows and objects within a graphical user interface. A hand...
Chan Wah Ng, Surendra Ranganath