Sciweavers

773 search results - page 135 / 155
» Efficient system design space exploration using machine lear...
Sort
View
IJRR
2002
87views more  IJRR 2002»
14 years 9 months ago
Complete Path Planning for Closed Kinematic Chains with Spherical Joints
We study the path planning problem, without obstacles, for closed kinematic chains with n links connected by spherical joints in space or revolute joints in the plane. The configu...
Jeffrey C. Trinkle, R. James Milgram
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 4 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
IUI
2006
ACM
15 years 3 months ago
Head gesture recognition in intelligent interfaces: the role of context in improving recognition
Acknowledging an interruption with a nod of the head is a natural and intuitive communication gesture which can be performed without significantly disturbing a primary interface ...
Louis-Philippe Morency, Trevor Darrell
ICCD
2004
IEEE
126views Hardware» more  ICCD 2004»
15 years 6 months ago
Implementation of Fine-Grained Cache Monitoring for Improved SMT Scheduling
Simultaneous Multithreading (SMT) is emerging as an effective microarchitecture model to increase the utilization of resources in modern super-scalar processors. However, co-sched...
Joshua L. Kihm, Daniel A. Connors
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...