Sciweavers

225 search results - page 20 / 45
» Multiplicatively interacting point processes and application...
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 1 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
FDG
2009
ACM
14 years 1 months ago
Relating cognitive models of computer games to user evaluations of entertainment
As the interactive entertainment industry matures, a better understanding of what makes software entertaining is needed. A natural starting point is the application of traditional...
Paolo Piselli, Mark Claypool, James Doyle
FLAIRS
2004
13 years 8 months ago
Developing Task Specific Sensing Strategies Using Reinforcement Learning
Robots that can adapt and perform multiple tasks promise to be a powerful tool with many applications. In order to achieve such robots, control systems have to be constructed that...
Srividhya Rajendran, Manfred Huber
ICPR
2006
IEEE
14 years 7 months ago
A Higher-Order Active Contour Model for Tree Detection
We present a model of a `gas of circles', the ensemble of regions in the image domain consisting of an unknown number of circles with approximately fixed radius and short ran...
Peter Horvath, Ian Jermyn, Zoltan Kato, and Josian...
IJON
2007
99views more  IJON 2007»
13 years 6 months ago
Criticality of avalanche dynamics in adaptive recurrent networks
In many studies of self-organized criticality (SOC), branching processes were used to model the dynamics of the activity of the system during avalanches. This mathematical simpliï...
Anna Levina, Udo Ernst, J. Michael Herrmann