Sciweavers

984 search results - page 142 / 197
» ideas 2010
Sort
View
84
Voted
ICPR
2010
IEEE
14 years 10 months ago
Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding
Similarity based pattern recognition is concerned with the analysis of patterns that are specified in terms of object dissimilarity or proximity rather than ordinal values. For man...
Weiping Xu, Edwin R. Hancock, Richard C. Wilson
165
Voted
ICRA
2010
IEEE
148views Robotics» more  ICRA 2010»
14 years 10 months ago
Global reachability and path planning for planetary exploration with montgolfiere balloons
Aerial vehicles are appealing systems for possible future exploration of planets and moons such as Venus and Titan, because they combine extensive coverage with highresolution data...
Lars Blackmore, Yoshiaki Kuwata, Michael T. Wolf, ...
133
Voted
IEEECIT
2010
IEEE
14 years 10 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
173
Voted
IFM
2010
Springer
183views Formal Methods» more  IFM 2010»
14 years 10 months ago
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation
Safe is a first-order eager functional language with facilities for programmer controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts...
Javier de Dios, Manuel Montenegro, Ricardo Pe&ntil...
116
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao