Sciweavers

719 search results - page 77 / 144
» What HMMs Can Do
Sort
View
ECCV
2000
Springer
14 years 9 months ago
Kruppa Equation Revisited: Its Renormalization and Degeneracy
In this paper, we study general questions about the solvability of the Kruppa equations and show that, in several special cases, the Kruppa equations can be renormalized and becom...
Jana Kosecka, René Vidal, Shankar Sastry, Y...
KDD
2009
ACM
150views Data Mining» more  KDD 2009»
14 years 8 months ago
Large human communication networks: patterns and a utility-driven generator
Given a real, and weighted person-to-person network which changes over time, what can we say about the cliques that it contains? Do the incidents of communication, or weights on t...
Nan Du, Christos Faloutsos, Bai Wang, Leman Akoglu
CHI
2010
ACM
14 years 2 months ago
The role of community and groupware in geocache creation and maintenance
Applications that provide location-based experiences are an increasingly viable design space given the proliferation of GPS-enabled mobile devices. However, these applications are...
Carman Neustaedter, Anthony Tang, Tejinder K. Judg...
WIMOB
2009
IEEE
14 years 2 months ago
Investigating Deployment Strategies for Multi-radio Multi-channel Residential Wireless Mesh Networks
— Multi-radio multi-channel Wireless Mesh Networks (WMNs) are being increasingly deployed for broadband provision in enterprise, community, metropolitan and rural areas, due to t...
Bin Huang, Yan He, Dmitri Perkins
NORDSEC
2009
Springer
14 years 2 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...