Sciweavers

552 search results - page 34 / 111
» Sources of Variability in MEG
Sort
View
EXACT
2008
15 years 2 days ago
Integrating Probabilistic and Knowledge-Based Systems for Explanation Generation
An important requirement for intelligent assistants is to have an explanation generation mechanism, so that the trainee has a better understanding of the recommended actions and ca...
Francisco Elizalde, Luis Enrique Sucar, Julieta No...
RAID
2010
Springer
14 years 7 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
ICC
2009
IEEE
140views Communications» more  ICC 2009»
14 years 7 months ago
Approximation Algorithms for Traffic Grooming in WDM Rings
Abstract-- This paper addresses the problem of traffic grooming in WDM rings in which all traffic emanates from a single node and all other nodes are destination nodes. This "...
Kevin Corcoran, Seth Flaxman, Mark Neyer, Peter Sc...
CVPR
2011
IEEE
14 years 4 months ago
Illumination Estimation and Cast Shadow Detection through a Higher-order Graphical Model
In this paper, we propose a novel framework to jointly recover the illumination environment and an estimate of the cast shadows in a scene from a single image, given coarse 3D geo...
Alexandros Panagopoulos, Chaohui Wang, Dimitris Sa...
MLMI
2005
Springer
15 years 3 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio