Sciweavers

3108 search results - page 586 / 622
» The Elements of Computer Credibility
Sort
View
IPSN
2010
Springer
14 years 5 months ago
Bayesian optimization for sensor set selection
We consider the problem of selecting an optimal set of sensors, as determined, for example, by the predictive accuracy of the resulting sensor network. Given an underlying metric ...
Roman Garnett, Michael A. Osborne, Stephen J. Robe...
HIPEAC
2009
Springer
14 years 5 months ago
Hybrid Super/Subthreshold Design of a Low Power Scalable-Throughput FFT Architecture
In this article, we present a parallel implementation of a 1024 point Fast Fourier Transform (FFT) operating with a subthreshold supply voltage, which is below the voltage that tur...
Michael B. Henry, Leyla Nazhandali
ICASSP
2009
IEEE
14 years 5 months ago
Compressive confocal microscopy
In this paper, a new approach for Confocal Microscopy (CM) based on the framework of compressive sensing is developed. In the proposed approach, a point illumination and a random ...
Peng Ye, José L. Paredes, Gonzalo R. Arce, ...
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
14 years 5 months ago
Phoneme acquisition model based on vowel imitation using Recurrent Neural Network
- A phoneme-acquisition system was developed using a computational model that explains the developmental process of human infants in the early period of acquiring language. There a...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 5 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...