Sciweavers

214 search results - page 10 / 43
» Neuro-fuzzy control based on the NEFCON-model: recent develo...
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 8 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
UAI
2008
13 years 9 months ago
Hierarchical POMDP Controller Optimization by Likelihood Maximization
Planning can often be simplified by decomposing the task into smaller tasks arranged hierarchically. Charlin et al. [4] recently showed that the hierarchy discovery problem can be...
Marc Toussaint, Laurent Charlin, Pascal Poupart
HASE
2007
IEEE
14 years 9 days ago
Precise Documentation of Critical Software
This experience and research based paper discusses the reasons that software cannot be trusted and then explains how the use of greatly improved documentation can make software mo...
David Lorge Parnas, Sergiy A. Vilkomir
ICA
2004
Springer
14 years 1 months ago
Accurate, Fast and Stable Denoising Source Separation Algorithms
Abstract. Denoising source separation is a recently introduced framework for building source separation algorithms around denoising procedures. Two developments are reported here. ...
Harri Valpola, Jaakko Särelä
ICONIP
2007
13 years 9 months ago
A Comparative Study of Synchrony Measures for the Early Detection of Alzheimer's Disease Based on EEG
It has repeatedly been reported in the medical literature that the EEG signals of Alzheimer’s disease (AD) patients are less synchronous than in age-matched control patients. Thi...
Justin Dauwels, François B. Vialatte, Andrz...