Sciweavers

11374 search results - page 2237 / 2275
» Demonstration of the CROSSMARC System
Sort
View
WORM
2004
15 years 3 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
WSC
2004
15 years 3 months ago
An Urban Terrain Abstraction to Support Decisionmaking Using Recursive Simulation
Recursive simulation is the technique of having simulated decisionmakers themselves use simulation to inform their decisionmaking. Issues of efficiency require that the recursive ...
John B. Gilmer Jr.
WSCG
2004
188views more  WSCG 2004»
15 years 3 months ago
Recognition of Motor Imagery Electroencephalography Using Independent Component Analysis and Machine Classifiers
Motor imagery electroencephalography (EEG), which embodies cortical potentials during mental simulation of left or right finger lifting tasks, can be used as neural input signals ...
Chih-I. Hung, Po-Lei Lee, Yu-Te Wu, Hui-Yun Chen, ...
WSPI
2004
15 years 3 months ago
Knowledge Relativity
Abstract. I introduce the notion of knowledge relativity as a proposed conceptual link between different scientific disciplines. Examples from Informatics and Philosophy, particula...
Oliver Hoffmann
AIPS
2000
15 years 3 months ago
Vision-Servoed Localization and Behavior-Based Planning for an Autonomous Quadruped Legged Robot
Planning for real robots to act in dynamic and uncertain environments is a challenging problem. A complete model of the world is not viable and an integration of deliberation and ...
Manuela M. Veloso, Elly Winner, Scott Lenser, Jame...
« Prev « First page 2237 / 2275 Last » Next »