Sciweavers

2585 search results - page 144 / 517
» computing 1999
Sort
View
ICRA
1999
IEEE
96views Robotics» more  ICRA 1999»
15 years 7 months ago
Examples of 3D Grasp Quality Computations
Previous grasp quality research is mainly theoretical, and has assumed that contact types and positions are given, in order to preserve the generality of the proposed quality meas...
Andrew T. Miller, Peter K. Allen
123
Voted
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 7 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
111
Voted
ICLP
1999
Springer
15 years 7 months ago
Computing Large and Small Stable Models
In this paper, we focus on the problem of existence of and computing small and large stable models. We show that for every xed integer k, there is a linear-time algorithm to decid...
Miroslaw Truszczynski
ICIP
1999
IEEE
16 years 5 months ago
Hyperparameter Estimation for Emission Computed Tomography Data
Over the last years many statistical models have been proposed to restore tomographical images. However, their use in medical environment has been limited due to several factors. ...
Aggelos K. Katsaggelos, Antonio López, Rafa...
ICARIS
2007
Springer
15 years 9 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...