Sciweavers

984 search results - page 142 / 197
» ideas 2010
Sort
View
ICPR
2010
IEEE
13 years 9 months ago
Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding
Similarity based pattern recognition is concerned with the analysis of patterns that are specified in terms of object dissimilarity or proximity rather than ordinal values. For man...
Weiping Xu, Edwin R. Hancock, Richard C. Wilson
ICRA
2010
IEEE
148views Robotics» more  ICRA 2010»
13 years 9 months ago
Global reachability and path planning for planetary exploration with montgolfiere balloons
Aerial vehicles are appealing systems for possible future exploration of planets and moons such as Venus and Titan, because they combine extensive coverage with highresolution data...
Lars Blackmore, Yoshiaki Kuwata, Michael T. Wolf, ...
IEEECIT
2010
IEEE
13 years 9 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
IFM
2010
Springer
183views Formal Methods» more  IFM 2010»
13 years 9 months ago
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation
Safe is a first-order eager functional language with facilities for programmer controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts...
Javier de Dios, Manuel Montenegro, Ricardo Pe&ntil...
INFOCOM
2010
IEEE
13 years 9 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao