Results 1 - 10
of
1,885
The Time-Triggered Architecture
- PROCEEDINGS OF THE IEEE
, 2003
"... The time-triggered architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time application is decomposed into nearly autonomous clusters and nodes, and a fault-tolerant global time base of known precision is g ..."
Abstract
-
Cited by 275 (10 self)
- Add to MetaCart
, explains the design rationale, discusses the time-triggered communication protocols TTP/C and TTP/A, and illustrates how transparent fault tolerance can be implemented in the TTA.
Real-Time Object Detection for "Smart" Vehicles
- INT'L CONF. ON COMPUTER VISION, CORFU
, 1999
"... This paper presents an efficient shape-based object detection method based on Distance Transforms and describes its use for real-time vision on-board vehicles. The method uses a template hierarchy to capture the variety of object shapes; efficient hierarchies can be generated offline for given shape ..."
Abstract
-
Cited by 243 (11 self)
- Add to MetaCart
with the equivalent brute-force formulation; we have measured gains of several orders of magnitudes. We present experimental results on the real-time detection of traffic signs and pedestrians from a moving vehicle. Because of the highly time sensitive nature of these vision tasks, we also discuss some hardware
On-line New Event Detection and Tracking
, 1998
"... We define and describe the related problems of new event detection and event tracking within a stream of broadcast news stories. We focus on a strict on-line setting-i.e., the system must make decisions about one story before looking at any subsequent stories. Our approach to detection uses a singl ..."
Abstract
-
Cited by 206 (5 self)
- Add to MetaCart
We define and describe the related problems of new event detection and event tracking within a stream of broadcast news stories. We focus on a strict on-line setting-i.e., the system must make decisions about one story before looking at any subsequent stories. Our approach to detection uses a
The eyes have it! Reflexive orienting is triggered by nonpredictive gaze
- Psychonomic Bulletin & Review
, 1998
"... Normal subjects were presented with a simple line drawing of a face looking left, right, or straight ahead. A target letter F or T then appeared to the left or the right of the face. All subjects participated in target detection, localization, and identification response conditions. Although subject ..."
Abstract
-
Cited by 154 (4 self)
- Add to MetaCart
Normal subjects were presented with a simple line drawing of a face looking left, right, or straight ahead. A target letter F or T then appeared to the left or the right of the face. All subjects participated in target detection, localization, and identification response conditions. Although
Probabilistic Author-Topic Models for Information Discovery
- THE TENTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING
, 2004
"... We propose a new unsupervised learning technique for extracting information from large text collections. We model documents as if they were generated by a two-stage stochastic process. Each author is represented by a probability distribution over topics, and each topic is represented as a probabilit ..."
Abstract
-
Cited by 173 (11 self)
- Add to MetaCart
by topic and topics by author, significant trends in the computer science literature between 1990 and 2002, parsing of abstracts by topics and authors and detection of unusual papers by specific authors. An online query interface to the model is also discussed that allows interactive exploration of author
Neural mechanisms for detecting and remembering novel events.
- Nat Rev Neurosci
, 2003
"... Imagine that you are in a classroom listening to a lecture. As you pay attention to the speaker, you might fail to notice other ongoing events, such as the students taking notes next to you or the flickering of a fluorescent light. Then, suddenly, your attention is diverted when a naked man enters ..."
Abstract
-
Cited by 139 (3 self)
- Add to MetaCart
novelty. Recent research has shown that the occurrence of a novel event triggers a cascade of neural events that are relevant to perception, attention, learning and memory. Although several models have been used to study the effects of novelty, the results from these different approaches might reveal
H: T cell-mediated lethal shock triggered in mice by the superantigen staphylococcal enterotoxin B: critical role of tumor necrosis factor
- J Exp Med
, 1992
"... Because mice are more resistant than humans to the pathogenic effects of bacterial toxins, we used D-Galactosamine- (D-Gal) sensitized mice as a modal system to evaluate potential toxic shock symptoms triggered by the superantigcn staphylococcal enterotoxin B (SEB). We show that similar to endotoxin ..."
Abstract
-
Cited by 98 (3 self)
- Add to MetaCart
Because mice are more resistant than humans to the pathogenic effects of bacterial toxins, we used D-Galactosamine- (D-Gal) sensitized mice as a modal system to evaluate potential toxic shock symptoms triggered by the superantigcn staphylococcal enterotoxin B (SEB). We show that similar
Pulmonary toxicity of single-walled carbon nanotubes in mice 7 and 90 days after intratracheal instillation.
- Toxicol. Sci.
, 2004
"... Nanomaterials are part of an industrial revolution to develop lightweight but strong materials for a variety of purposes. Singlewall carbon nanotubes are an important member of this class of materials. They structurally resemble rolled-up graphite sheets, usually with one end capped; individually t ..."
Abstract
-
Cited by 104 (1 self)
- Add to MetaCart
. Unprocessed nanotubes are very light and could become airborne and potentially reach the lungs. Because the toxicity of nanotubes in the lung is not known, their pulmonary toxicity was investigated. The three products studied were made by different methods and contained different types and amounts of residual
Sentiment strength detection in short informal text
- J AM SOC INF SCI TECHNOL. 2010 DECEMBER;61:2544–2558
, 2010
"... A huge number of informal messages are posted every day in social network sites, blogs and discussion forums. Emotions seem to be frequently important in these texts for expressing friendship, showing social support or as part of online arguments. Algorithms to identify sentiment and sentiment stren ..."
Abstract
-
Cited by 92 (7 self)
- Add to MetaCart
A huge number of informal messages are posted every day in social network sites, blogs and discussion forums. Emotions seem to be frequently important in these texts for expressing friendship, showing social support or as part of online arguments. Algorithms to identify sentiment and sentiment
Measuring and Detecting Fast-Flux Service Networks
"... We present the first empirical study of fast-flux service networks (FFSNs), a newly emerging and still not widelyknown phenomenon in the Internet. FFSNs employ DNS to establish a proxy network on compromised machines through which illegal online services can be hosted with very high availability. Th ..."
Abstract
-
Cited by 84 (5 self)
- Add to MetaCart
. Through our measurements we show that the threat which FFSNs pose is significant: FFSNs occur on a worldwide scale and already host a substantial percentage of online scams. Based on analysis of the principles of FFSNs, we develop a metric with which FFSNs can be effectively detected. Considering our
Results 1 - 10
of
1,885