Sciweavers

885 search results - page 171 / 177
» Extensions of the Informative Vector Machine
Sort
View
ICRA
2009
IEEE
178views Robotics» more  ICRA 2009»
13 years 5 months ago
A riemannian-geometry approach for dynamics and control of object manipulation under constraints
A Riemannian-geometry approach for control and stabilization of dynamics of object manipulation under holonomic or non-holonomic (but Pfaffian) constraints is presented. First, pos...
Suguru Arimoto, Morio Yoshida, Masahiro Sekimoto, ...
ASC
2011
13 years 2 months ago
Autonomic fault-handling and refurbishment using throughput-driven assessment
A new paradigm for online EH regeneration using Genetic Algorithms (GAs) called Competitive Runtime Reconfiguration (CRR) is developed where performance is assessed based upon a b...
Ronald F. DeMara, Kening Zhang, Carthik A. Sharma
SIGIR
2003
ACM
14 years 29 days ago
Transliteration of proper names in cross-language applications
Translation of proper names is generally recognized as a significant problem in many multi-lingual text and speech processing applications. Even when large bilingual lexicons use...
Paola Virga, Sanjeev Khudanpur
IDA
2009
Springer
13 years 5 months ago
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
We address the applicability of blind source separation (BSS) methods for the estimation of hidden influences in biological dynamic systems such as metabolic or gene regulatory net...
Florian Blöchl, Fabian J. Theis
IMC
2006
ACM
14 years 1 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan