Sciweavers

9683 search results - page 1878 / 1937
» Query performance prediction
Sort
View
147
Voted
ESEM
2010
ACM
15 years 1 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
145
Voted
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
15 years 28 days ago
Visual odometry priors for robust EKF-SLAM
— One of the main drawbacks of standard visual EKF-SLAM techniques is the assumption of a general camera motion model. Usually this motion model has been implemented in the liter...
Pablo Fernández Alcantarilla, Luis Miguel B...
JOCN
2010
104views more  JOCN 2010»
15 years 26 days ago
Spatial Attention Evokes Similar Activation Patterns for Visual and Auditory Stimuli
■ Neuroimaging studies suggest that a fronto-parietal network is activated when we expect visual information to appear at a specific spatial location. Here we examined whether a...
David V. Smith, Ben Davis, Kathy Niu, Eric W. Heal...
NECO
2010
103views more  NECO 2010»
15 years 25 days ago
Posterior Weighted Reinforcement Learning with State Uncertainty
Reinforcement learning models generally assume that a stimulus is presented that allows a learner to unambiguously identify the state of nature, and the reward received is drawn f...
Tobias Larsen, David S. Leslie, Edmund J. Collins,...
150
Voted
PDP
2010
IEEE
15 years 25 days ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao
« Prev « First page 1878 / 1937 Last » Next »