Sciweavers

2200 search results - page 399 / 440
» Hop Integrity in Computer Networks
Sort
View
ICDM
2007
IEEE
174views Data Mining» more  ICDM 2007»
15 years 9 months ago
Targeting Input Data for Acoustic Bird Species Recognition Using Data Mining and HMMs
In this paper we propose the integration of Data Mining with Hidden Markov Models when applied to the problem of acoustic bird species recognition. We first show how each of them...
Erika Vilches, Ivan A. Escobar, Edgar E. Vallejo, ...
106
Voted
IROS
2007
IEEE
114views Robotics» more  IROS 2007»
15 years 9 months ago
Design and control of a second-generation hyper-redundant mechanism
— We present a refined, second-generation design, construction and integration, of a compact hyper-redundant snakelike robot, called “Woodstock.” This robot has substantial a...
H. Ben Brown, Michael Schwerin, Elie A. Shammas, H...
POLICY
2007
Springer
15 years 8 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
IJCNN
2006
IEEE
15 years 8 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
113
Voted
SOUPS
2006
ACM
15 years 8 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker