Sciweavers

NIPS
2003
14 years 26 days ago
Reconstructing MEG Sources with Unknown Correlations
Existing source location and recovery algorithms used in magnetoencephalographic imaging generally assume that the source activity at different brain locations is independent or t...
Maneesh Sahani, Srikantan S. Nagarajan
ICAD
2004
14 years 27 days ago
Selective and Divided Attention: Extracting Information from Simultaneous Sound Sources
The way in which sounds interact and interfere with each other (both acoustically and perceptually) has an important influence on how well an auditory display can convey informati...
Barbara G. Shinn-Cunningham, Antje Ihlefeld
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 5 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
ROBIO
2006
IEEE
156views Robotics» more  ROBIO 2006»
14 years 5 months ago
Abstraction of Odor Source Declaration Algorithm from Moth-Inspired Plume Tracing Strategies
—A moth behavior-inspired strategy, including tracing a chemical plume to its source and declaring the source location, was tested in near shore ocean conditions via a REMUS unde...
Wei Li