Sciweavers

349 search results - page 51 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
HPDC
2010
IEEE
13 years 9 months ago
Modeling sequence and function similarity between proteins for protein functional annotation
A common task in biological research is to predict function for proteins by comparing sequences between proteins of known and unknown function. This is often done using pair-wise ...
Roger Higdon, Brenton Louie, Eugene Kolker
CVPR
2004
IEEE
14 years 10 months ago
A Probabilistic Framework for Combining Tracking Algorithms
For the past few years researches have been investigating enhancing tracking performance by combining several different tracking algorithms. We propose an analytically justified, ...
Ido Leichter, Michael Lindenbaum, Ehud Rivlin
IROS
2007
IEEE
206views Robotics» more  IROS 2007»
14 years 2 months ago
Dexterous manipulation planning using probabilistic roadmaps in continuous grasp subspaces
— In this paper, we propose a new method for the motion planning problem of rigid object dexterous manipulation with a robotic multi-fingered hand, under quasi-static movement a...
Jean-Philippe Saut, Anis Sahbani, Sahar El-Khoury,...
DSOM
2007
Springer
14 years 2 months ago
Probabilistic Fault Diagnosis Using Adaptive Probing
Past research on probing-based network monitoring provides solutions based on preplanned probing which is computationally expensive, is less accurate, and involves a large manageme...
Maitreya Natu, Adarshpal S. Sethi
BROADNETS
2004
IEEE
14 years 10 days ago
Diverse Routing for Shared Risk Resource Groups (SRRG) Failures in WDM Optical Networks
Failure resilience is one of the desired features of the Internet. Most of the traditional restoration architectures are based on single-failure assumption which is unrealistic. M...
Pallab Datta, Arun K. Somani