Sciweavers

1548 search results - page 199 / 310
» Computational Approaches to Sentence Completion
Sort
View
ICRA
2005
IEEE
161views Robotics» more  ICRA 2005»
14 years 2 months ago
Leveraging Limited Autonomous Mobility to Frame Attractive Group Photos
- Robot photographers have appeared in a variety of novelty settings over the past few years and typically have exploited rudimentary image-content-based approaches to identifying ...
Jason Campbell, Padmanabhan Pillai
SMI
2005
IEEE
14 years 2 months ago
Maximizing Adaptivity in Hierarchical Topological Models
We present an approach to hierarchically encode the topology of functions over triangulated surfaces. We describe the topology of a function by its Morse-Smale complex, a well kno...
Peer-Timo Bremer, Valerio Pascucci, Bernd Hamann
TRIDENTCOM
2005
IEEE
14 years 2 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau
POLICY
2004
Springer
14 years 2 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
RAID
2004
Springer
14 years 2 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...