Sciweavers

3760 search results - page 497 / 752
» Logic-Based Probabilistic Modeling
Sort
View
ICRA
2006
IEEE
149views Robotics» more  ICRA 2006»
15 years 10 months ago
On Learning the Statistical Representation of a Task and Generalizing it to Various Contexts
— This paper presents an architecture for solving generically the problem of extracting the constraints of a given task in a programming by demonstration framework and the problem...
Sylvain Calinon, Florent Guenter, Aude Billard
INFOCOM
2006
IEEE
15 years 10 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 10 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
CVPR
2008
IEEE
15 years 10 months ago
General Constraints for Batch Multiple-Target Tracking Applied to Large-Scale Videomicroscopy
While there is a large class of Multiple-Target Tracking (MTT) problems for which batch processing is possible and desirable, batch MTT remains relatively unexplored in comparis...
Kevin Smith, Alan Carleton, Vincent Lepetit
ESORICS
2004
Springer
15 years 9 months ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini