Sciweavers

8669 search results - page 1307 / 1734
» Computing matrix representations
Sort
View
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
15 years 11 months ago
Discovering Excitatory Networks from Discrete Event Streams with Applications to Neuronal Spike Train Analysis
—Mining temporal network models from discrete event streams is an important problem with applications in computational neuroscience, physical plant diagnostics, and human-compute...
Debprakash Patnaik, Srivatsan Laxman, Naren Ramakr...
ICRA
2009
IEEE
121views Robotics» more  ICRA 2009»
15 years 11 months ago
Real-time trajectory generation for car-like vehicles navigating dynamic environments
— This paper presents Tiji, a trajectory generation scheme, ie an algorithm that computes a feasible trajectory between a start and a goal state, for a given robotic system. Tiji...
Vivien Delsart, Thierry Fraichard, Luis Martinez
IROS
2009
IEEE
128views Robotics» more  IROS 2009»
15 years 11 months ago
Motion planning for active cannulas
— An active cannula is a medical device composed of thin, pre-curved, telescoping tubes that may enable many new surgical procedures. Planning optimal motions for these devices i...
Lisa A. Lyons, Robert J. Webster, Ron Alterovitz
MHCI
2009
Springer
15 years 11 months ago
Wavelet menus: a stacking metaphor for adapting marking menus to mobile devices
Exploration and navigation in multimedia data hierarchies (e.g., photos, music) are frequent tasks on mobile devices. However, visualization and interaction are impoverished due t...
Jérémie Francone, Gilles Bailly, Lau...
SERSCISA
2009
Springer
15 years 11 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
« Prev « First page 1307 / 1734 Last » Next »