Sciweavers

10435 search results - page 1961 / 2087
» Measuring system normality
Sort
View
MEDIAFORENSICS
2010
15 years 2 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
MEDINFO
2007
132views Healthcare» more  MEDINFO 2007»
15 years 2 months ago
Comparing Decision Support Methodologies for Identifying Asthma Exacerbations
Objective: To apply and compare common machine learning techniques with an expert-built Bayesian Network to determine eligibility for asthma guidelines in pediatric emergency depa...
Judith W. Dexheimer, Laura E. Brown, Jeffrey Leego...
101
Voted
NIPS
2007
15 years 2 months ago
Learning and using relational theories
Much of human knowledge is organized into sophisticated systems that are often called intuitive theories. We propose that intuitive theories are mentally represented in a logical ...
Charles Kemp, Noah Goodman, Joshua B. Tenenbaum
116
Voted
RSS
2007
192views Robotics» more  RSS 2007»
15 years 2 months ago
Map-Based Precision Vehicle Localization in Urban Environments
Abstract— Many urban navigation applications (e.g., autonomous navigation, driver assistance systems) can benefit greatly from localization with centimeter accuracy. Yet such ac...
Jesse Levinson, Michael Montemerlo, Sebastian Thru...
111
Voted
DAGSTUHL
2003
15 years 2 months ago
Components, Features, and Agents in the ABC
Abstract. In this paper, we show how the concepts of objects, components, features and agents are used today in the Agent Building Center (ABC) environment in order to marry the mo...
Tiziana Margaria
« Prev « First page 1961 / 2087 Last » Next »