Sciweavers

696 search results - page 88 / 140
» Explaining abstract counterexamples
Sort
View
118
Voted
CSE
2009
IEEE
15 years 10 months ago
Structure of Neighborhoods in a Large Social Network
Abstract—We present here a method for analyzing the neighborhoods of all the vertices in a large graph. We first give an algorithm for characterizing a simple undirected graph t...
Alina Stoica, Christophe Prieur
ICRA
2009
IEEE
156views Robotics» more  ICRA 2009»
15 years 10 months ago
Deformation modeling of belt object with angles
Abstract— A differential geometry based modeling to represent belt object deformation is proposed. Deformation of a belt object such as film circuit boards or flexible circuit ...
Hidefumi Wakamatsu, Eiji Morinaga, Eiji Arai, Shin...
159
Voted
ICRA
2009
IEEE
137views Robotics» more  ICRA 2009»
15 years 10 months ago
Continuous vocal imitation with self-organized vowel spaces in Recurrent Neural Network
Abstract— A continuous vocal imitation system was developed using a computational model that explains the process of phoneme acquisition by infants. Human infants perceive speech...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
ADBIS
2009
Springer
143views Database» more  ADBIS 2009»
15 years 10 months ago
Cost-Based Vectorization of Instance-Based Integration Processes
The inefficiency of integration processes—as an abstraction of workflow-based integration tasks—is often reasoned by low resource utilization and significant waiting times f...
Matthias Böhm, Dirk Habich, Steffen Preissler...
132
Voted
UIC
2009
Springer
15 years 10 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...