Sciweavers

575 search results - page 90 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
CSE
2010
IEEE
13 years 7 months ago
MCALab: Reproducible Research in Signal and Image Decomposition and Inpainting
Morphological Component Analysis (MCA) of signals and images is an ambitious and important goal in signal processing; successful methods for MCA have many far-reaching application...
Mohamed-Jalal Fadili, Jean-Luc Starck, Michael Ela...
GECCO
2008
Springer
261views Optimization» more  GECCO 2008»
13 years 8 months ago
SSNNS -: a suite of tools to explore spiking neural networks
We are interested in engineering smart machines that enable backtracking of emergent behaviors. Our SSNNS simulator consists of hand-picked tools to explore spiking neural network...
Heike Sichtig, J. David Schaffer, Craig B. Laramee
ATAL
2008
Springer
13 years 9 months ago
Distributed multiagent resource allocation in diminishing marginal return domains
We consider a multiagent resource allocation domain where the marginal production of each resource is diminishing. A set of identical, self-interested agents requires access to sh...
Yoram Bachrach, Jeffrey S. Rosenschein
IPPS
2008
IEEE
14 years 2 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
ICPR
2008
IEEE
14 years 2 months ago
Retinal vessel tree segmentation using a deformable contour model
This paper presents an improved version of our specific methodology to detect the vessel tree in retinal angiographies. The automatic analysis of retinal vessel tree facilitates ...
Lucia Espona, María J. Carreira, Manuel Fra...