Sciweavers

1127 search results - page 168 / 226
» A Dynamical Systems Approach to Behavior-Based Formation Con...
Sort
View
ACSC
2006
IEEE
14 years 1 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
RTCSA
1997
IEEE
13 years 12 months ago
Behavior verification of hybrid real-time requirements by qualitative formalism
Although modern control theories have been successfully applied to solve a variety of problems, they are often mathematically and physically too specific to describe and analyze t...
Jang-Soo Lee, Sung Deok Cha
NN
2000
Springer
134views Neural Networks» more  NN 2000»
13 years 7 months ago
Generic modeling of chemotactic based self-wiring of neural networks
The proper functioning of the nervous system depends critically on the intricate network of synaptic connections that are generated during the system development. During the netwo...
Ronen Segev, Eshel Ben-Jacob
BICOB
2009
Springer
13 years 5 months ago
A Biclustering Method to Discover Co-regulated Genes Using Diverse Gene Expression Datasets
We propose a two-step biclustering approach to mine co-regulation patterns of a given reference gene to discover other genes that function in a common biological process. Currently...
Doruk Bozdag, Jeffrey D. Parvin, Ümit V. &Cce...
ICMCS
2000
IEEE
94views Multimedia» more  ICMCS 2000»
14 years 3 days ago
A Live Video Imaging Method for Capturing Presentation Information in Distance Learning
We propose a new approach of video imaging method suitable to support distance learning. Automatic active camera control and video selection system visualizes presentation informa...
Yoshinari Kameda, Kentaro Ishizuka, Michihiko Mino...