Sciweavers

9405 search results - page 1619 / 1881
» Computing a Model of Set Theory
Sort
View
ISSA
2008
15 years 6 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
15 years 6 months ago
Dimension augmentation and combinatorial criteria for efficient error-resistant DNA self-assembly
DNA self-assembly has emerged as a rich and promising primitive for nano-technology. Experimental and analytical evidence indicates that such systems are prone to errors, and acco...
Ho-Lin Chen, Ashish Goel, Chris Luhrs
163
Voted
AAAI
2004
15 years 6 months ago
Analogical Path Planning
We present a probabilistic method for path planning that considers trajectories constrained by both the environment and an ensemble of restrictions or preferences on preferred mot...
Saul Simhon, Gregory Dudek
EMNLP
2004
15 years 6 months ago
Unsupervised Domain Relevance Estimation for Word Sense Disambiguation
This paper presents Domain Relevance Estimation (DRE), a fully unsupervised text categorization technique based on the statistical estimation of the relevance of a text with respe...
Alfio Massimiliano Gliozzo, Bernardo Magnini, Carl...
GRAPHICSINTERFACE
2003
15 years 6 months ago
A Gestural Interface to Free-Form Deformation
We present a gesture-based user interface to Free-Form Deformation (FFD). Traditional interfaces for FFD require the manipulation of individual points in a lattice of control vert...
Geoffrey Draper, Parris K. Egbert
« Prev « First page 1619 / 1881 Last » Next »