Sciweavers

5722 search results - page 1117 / 1145
» Security Function Interactions
Sort
View
INFORMATIKTAGE
2008
13 years 11 months ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg
AAAI
2006
13 years 11 months ago
Action Selection in Bayesian Reinforcement Learning
My research attempts to address on-line action selection in reinforcement learning from a Bayesian perspective. The idea is to develop more effective action selection techniques b...
Tao Wang
APBC
2004
122views Bioinformatics» more  APBC 2004»
13 years 11 months ago
Integrating Biopathway Databases for Large-scale Modeling and Simulation
Biopathway databases have been developed, such as KEGG and EcoCyc, that compile interaction structures of biopathways together with biological annotations. However, these biopathw...
Masao Nagasaki, Atsushi Doi, Hiroshi Matsuno, Sato...
CGVR
2006
13 years 11 months ago
Development of Stereoscopic Image Editing Tool using Image-Based Modeling
- In recent years, techniques have shown an increased interest in research and development related to stereoscopic imaging. However, unlike 2D image, stereoscopic image is generate...
Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoo...
CSREAESA
2006
13 years 11 months ago
The Satellite Data Model
The Satellite Data Model (SDM) is part of the Air Force Research Laboratory (AFRL) Responsive Space Testbed Initiative. It is a developing standard for rapid integration of hardwa...
Kenneth Sundberg, Scott Cannon, Todd Hospodarsky, ...
« Prev « First page 1117 / 1145 Last » Next »