Sciweavers

5948 search results - page 1144 / 1190
» Computing Robust Counter-Strategies
Sort
View
JCP
2007
108views more  JCP 2007»
14 years 9 months ago
A Genetic Algorithm Method to Assimilate Sensor Data for a Toxic Contaminant Release
— Following a toxic contaminant release, either accidental or intentional, predicting the transport and dispersion of the contaminant becomes a critical problem for Homeland Defe...
Sue Ellen Haupt, George S. Young, Christopher T. A...
TOG
2008
102views more  TOG 2008»
14 years 9 months ago
Fluorescent immersion range scanning
The quality of a 3D range scan should not depend on the surface properties of the object. Most active range scanning techniques, however, assume a diffuse reflector to allow for a...
Matthias B. Hullin, Martin Fuchs, Ivo Ihrke, Hans-...
TSP
2008
117views more  TSP 2008»
14 years 9 months ago
Sample Eigenvalue Based Detection of High-Dimensional Signals in White Noise Using Relatively Few Samples
The detection and estimation of signals in noisy, limited data is a problem of interest to many scientific and engineering communities. We present a mathematically justifiable, com...
R. R. Nadakuditi, A. Edelman
BC
2002
108views more  BC 2002»
14 years 9 months ago
Spike-timing-dependent plasticity: common themes and divergent vistas
Abstract. Recent experimental observations of spiketiming-dependent synaptic plasticity (STDP) have revitalized the study of synaptic learning rules. The most surprising aspect of ...
Ádám Kepecs, Mark C. W. van Rossum, ...
CCR
2004
116views more  CCR 2004»
14 years 9 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan
« Prev « First page 1144 / 1190 Last » Next »