Sciweavers

9726 search results - page 1821 / 1946
» An Approach to Optimize Data Processing in Business Processe...
Sort
View
IICAI
2007
15 years 6 months ago
Extractive Summarization in Clinical Trials Protocol Summaries: A Case Study
This paper presents a method for extracting purpose statements from clinical trial protocol summaries. Simple summarization technology based on regular expressions and natural lang...
Graciela Rosemblat, Laurel Graham, Tony Tse
NIPS
2008
15 years 6 months ago
Estimating the Location and Orientation of Complex, Correlated Neural Activity using MEG
The synchronous brain activity measured via MEG (or EEG) can be interpreted as arising from a collection (possibly large) of current dipoles or sources located throughout the cort...
David P. Wipf, Julia Owen, Hagai Attias, Kensuke S...
LWA
2007
15 years 6 months ago
Incremental Mining for Facility Management
Modern buildings are equipped with high-tech systems that take care of several fundamental aspects, e.g., air-conditioning, heating and water supply. The requirements posed on fac...
Katja Hose, Marcel Karnstedt, Daniel Klan, Kai-Uwe...
RSS
2007
173views Robotics» more  RSS 2007»
15 years 6 months ago
Mapping Large Loops with a Single Hand-Held Camera
— This paper presents a method for Simultaneous Localization and Mapping (SLAM), relying on a monocular camera as the only sensor, which is able to build outdoor, closed-loop map...
Laura A. Clemente, Andrew J. Davison, Ian D. Reid,...
144
Voted
CSREASAM
2006
15 years 6 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
« Prev « First page 1821 / 1946 Last » Next »