Sciweavers

BC
2005
98views more  BC 2005»
13 years 11 months ago
Integrating behavioral and neural data in a model of zebrafish network interaction
The spinal neural networks of larval zebrafish (Danio rerio) generate a variety of movements such as escape, struggling, and swimming. Various mechanisms at the neural and network ...
P. Dwight Kuo, Chris Eliasmith
SIGIR
2008
ACM
13 years 11 months ago
Talking the talk vs. walking the walk: salience of information needs in querying vs. browsing
Traditional information retrieval models assume that users express their information needs via text queries (i.e., their "talk"). In this poster, we consider Web browsin...
Mikhail Bilenko, Ryen W. White, Matthew Richardson...
SCL
2008
95views more  SCL 2008»
13 years 11 months ago
Regular implementation in the space of compactly supported functions
This article extends results on regular implementablity in [3] and [8] to the case when the signal space is not an injective cogenerator, for instance, the space D of compactly su...
D. Napp Avelli, Shiva Shankar, Harry L. Trentelman
PAMI
2008
183views more  PAMI 2008»
13 years 11 months ago
Shape-and-Behavior Encoded Tracking of Bee Dances
Behavior analysis of social insects has garnered impetus in recent years and has led to some advances in fields like control systems, flight navigation etc. Manual labeling of ins...
Ashok Veeraraghavan, Rama Chellappa, Mandyam Srini...
MCS
2006
Springer
13 years 11 months ago
Architectural concepts and Design Patterns for behavior modeling and integration
The design of the control software for complex systems is a difficult task. It requires the modeling, the simulation, the integration and the adaptation of a multitude of intercon...
Jean-Marc Perronne, Laurent Thiry, Bernard Thirion
ENTCS
2007
107views more  ENTCS 2007»
13 years 11 months ago
Modeling Environment for Component Model Checking from Hierarchical Architecture
Application of model checking to isolated software components is not directly possible because a component does not form a complete program - the problem of missing environment oc...
Pavel Parizek, Frantisek Plasil
DKE
2007
130views more  DKE 2007»
13 years 11 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
JASIS
2008
94views more  JASIS 2008»
13 years 11 months ago
Eye tracking and online search: Lessons learned and challenges ahead
esult abstracts viewed and those clicked on, and whether gender, search task, or search engine influence these behaviors. In addition, we discuss a key challenge that arose in all ...
Lori Lorigo, Maya Haridasan, Hrönn Brynjarsd&...
IJFCS
2006
119views more  IJFCS 2006»
13 years 11 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
IJSC
2008
161views more  IJSC 2008»
13 years 11 months ago
Automatic Generation of Gaze and Gestures for Dialogues between Embodied Conversational Agents
In this paper we introduce a system that automatically adds different types of non-verbal behavior to a given dialogue script between two virtual embodied agents. It allows us to t...
Werner Breitfuss, Helmut Prendinger, Mitsuru Ishiz...