Sciweavers

1407 search results - page 231 / 282
» Systems Theory Model for Information Security
Sort
View
ICMCS
2006
IEEE
161views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Improved Similarity-Based Online Feature Selection in Region-Based Image Retrieval
To bridge the gap between high level semantic concepts and low level visual features in content-based image retrieval (CBIR), online feature selection is really required. An effec...
Fei Li, Qionghai Dai, Wenli Xu
IROS
2006
IEEE
120views Robotics» more  IROS 2006»
14 years 3 months ago
Learning from Nature to Build Intelligent Autonomous Robots
Information processing within autonomous robots should follow a biomimetic approach. In contrast to traditional approaches that make intensive use of accurate measurements, numeric...
Rainer Bischoff 0002, Volker Graefe
ACMDIS
2006
ACM
14 years 3 months ago
Investigating design knowledge reuse for interface development
Reusing HCI design knowledge shows potential in allowing practitioners to design based on previously identified concerns. A reuse approach is presented that is based on claims, de...
Shahtab Wahid
ACMICEC
2007
ACM
112views ECommerce» more  ACMICEC 2007»
14 years 1 months ago
An empirical study of interest-based negotiation
While argumentation-based negotiation has been accepted as a promising alternative to game-theoretic or heuristic based negotiation, no evidence has been provided to confirm this ...
Philippe Pasquier, Ramon Hollands, Frank Dignum, I...
CORR
2011
Springer
202views Education» more  CORR 2011»
13 years 4 months ago
Network Estimation and Packet Delivery Prediction for Control over Wireless Mesh Networks
: Much of the current theory of networked control systems uses simple point-to-point communiodels as an abstraction of the underlying network. As a result, the controller has very ...
Phoebus Chen, Chithrupa Ramesh, Karl Henrik Johans...