Sciweavers

977 search results - page 32 / 196
» Soft Constraints for Security
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 10 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ICRA
2006
IEEE
130views Robotics» more  ICRA 2006»
15 years 4 months ago
Study on Hemispherical Soft-fingered Handling for fine Manipulation by Minimum D.O.F. Robotic Hand
— This paper provides that an elastic force and an elastic potential energy due to the deformation of soft fingers, which are previously derived, can be calculated into straight...
Takahiro Inoue, Shinichi Hirai
TIT
2008
102views more  TIT 2008»
14 years 9 months ago
Extremal Problems of Information Combining
Abstract--In this paper, we study moments of soft bits of binary-input symmetric-output channels and solve some extremal problems of the moments. We use these results to solve the ...
Yibo Jiang, Alexei E. Ashikhmin, Ralf Koetter, And...
AI
2010
Springer
14 years 10 months ago
Soft arc consistency revisited
The Valued Constraint Satisfaction Problem (VCSP) is a generic optimization problem defined by a network of local cost functions defined over discrete variables. It has applicatio...
Martin C. Cooper, Simon de Givry, M. Sanchez, Thom...
GD
2005
Springer
15 years 3 months ago
A Mixed-Integer Program for Drawing High-Quality Metro Maps
In this paper we investigate the problem of drawing metro maps which is defined as follows. Given a planar graph G of maximum degree 8 with its embedding and vertex locations (e.g...
Martin Nöllenburg, Alexander Wolff