Sciweavers

7504 search results - page 1200 / 1501
» Computing with Action Potentials
Sort
View
SBACPAD
2006
IEEE
148views Hardware» more  SBACPAD 2006»
15 years 10 months ago
Scalable Parallel Implementation of Bayesian Network to Junction Tree Conversion for Exact Inference
We present a scalable parallel implementation for converting a Bayesian network to a junction tree, which can then be used for a complete parallel implementation for exact inferen...
Vasanth Krishna Namasivayam, Animesh Pathak, Vikto...
VLSID
2006
IEEE
158views VLSI» more  VLSID 2006»
15 years 10 months ago
Programmable LDPC Decoder Based on the Bubble-Sort Algorithm
Low density parity check (LDPC) codes are one of the most powerful error correcting codes known. Recent research have pointed out their potential for a low cost, low latency hardw...
Rohit Singhal, Gwan S. Choi, Rabi N. Mahapatra
136
Voted
HRI
2006
ACM
15 years 10 months ago
How contingent should a communication robot be?
The purpose of our research is to develop lifelike behavior in a communication robot, which is expected to potentially make human-robot interaction more natural. Our previous rese...
Fumitaka Yamaoka, Takayuki Kanda, Hiroshi Ishiguro...
IMC
2006
ACM
15 years 10 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills
ITICSE
2006
ACM
15 years 10 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
« Prev « First page 1200 / 1501 Last » Next »