Sciweavers

3785 search results - page 661 / 757
» Immune System Based Intrusion Detection System
Sort
View
AMTA
2004
Springer
15 years 10 months ago
A Fluency Error Categorization Scheme to Guide Automated Machine Translation Evaluation
Abstract. Existing automated MT evaluation methods often require expert human translations. These are produced for every language pair evaluated and, due to this expense, subsequen...
Debbie Elliott, Anthony Hartley, Eric Atwell
BIOADIT
2004
Springer
15 years 10 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
HUC
2004
Springer
15 years 10 months ago
The NearMe Wireless Proximity Server
Abstract. NearMe is a server, algorithms, and application programming interfaces (APIs) for clients equipped with 802.11 wireless networking (Wi-Fi) to compute lists of people and ...
John Krumm, Ken Hinckley
ICRA
2002
IEEE
91views Robotics» more  ICRA 2002»
15 years 9 months ago
Tactile Tracking of Arteries in Robotic Surgery
Locating arteries hidden beneath superficial tissue can be a difficult task in minimally invasive surgery. This paper reports the development of a system that finds the paths of a...
Ryan A. Beasley, Robert D. Howe
ICS
2001
Tsinghua U.
15 years 9 months ago
Computer aided hand tuning (CAHT): "applying case-based reasoning to performance tuning"
For most parallel and high performance systems, tuning guides provide the users with advices to optimize the execution time of their programs. Execution time may be very sensitive...
Antoine Monsifrot, François Bodin