Sciweavers

5722 search results - page 1048 / 1145
» Security Function Interactions
Sort
View
159
Voted
AAMAS
1999
Springer
15 years 2 months ago
Fully Embodied Conversational Avatars: Making Communicative Behaviors Autonomous
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...
Justine Cassell, Hannes Högni Vilhjálm...
TIT
1998
216views more  TIT 1998»
15 years 2 months ago
Data Compression and Harmonic Analysis
In this article we review some recent interactions between harmonic analysis and data compression. The story goes back of course to Shannon’s R(D) theory in the case of Gaussian...
David L. Donoho, Martin Vetterli, Ronald A. DeVore...
TNN
1998
114views more  TNN 1998»
15 years 2 months ago
Bayesian retrieval in associative memories with storage errors
Abstract—It is well known that for finite-sized networks, onestep retrieval in the autoassociative Willshaw net is a suboptimal way to extract the information stored in the syna...
Friedrich T. Sommer, Peter Dayan
142
Voted
BMCBI
2010
153views more  BMCBI 2010»
15 years 2 months ago
Pash 3.0: A versatile software package for read mapping and integrative analysis of genomic and epigenomic variation using massi
Background: Massively parallel sequencing readouts of epigenomic assays are enabling integrative genome-wide analyses of genomic and epigenomic variation. Pash 3.0 performs sequen...
Cristian Coarfa, Fuli Yu, Christopher A. Miller, Z...
VR
2008
IEEE
233views Virtual Reality» more  VR 2008»
15 years 29 days ago
Cutting, Deforming and Painting of 3D meshes in a Two Handed Viso-haptic VR System
We describe M4, the multi-modal mesh manipulation system, which aims to provide a more intuitive desktop interface for freeform manipulation of 3D meshes. The system combines inte...
Adam Faeth, Michael Oren, Jonathan Sheller, Sean G...
« Prev « First page 1048 / 1145 Last » Next »