Sciweavers

773 search results - page 135 / 155
» Efficient system design space exploration using machine lear...
Sort
View
IJRR
2002
87views more  IJRR 2002»
14 years 11 months ago
Complete Path Planning for Closed Kinematic Chains with Spherical Joints
We study the path planning problem, without obstacles, for closed kinematic chains with n links connected by spherical joints in space or revolute joints in the plane. The configu...
Jeffrey C. Trinkle, R. James Milgram
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 6 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
IUI
2006
ACM
15 years 5 months ago
Head gesture recognition in intelligent interfaces: the role of context in improving recognition
Acknowledging an interruption with a nod of the head is a natural and intuitive communication gesture which can be performed without significantly disturbing a primary interface ...
Louis-Philippe Morency, Trevor Darrell
ICCD
2004
IEEE
126views Hardware» more  ICCD 2004»
15 years 8 months ago
Implementation of Fine-Grained Cache Monitoring for Improved SMT Scheduling
Simultaneous Multithreading (SMT) is emerging as an effective microarchitecture model to increase the utilization of resources in modern super-scalar processors. However, co-sched...
Joshua L. Kihm, Daniel A. Connors
IMC
2009
ACM
15 years 6 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...