Sciweavers

7682 search results - page 1491 / 1537
» Active Appearance Models
Sort
View
140
Voted
BICOB
2009
Springer
15 years 10 months ago
Assembly of Large Genomes from Paired Short Reads
The de novo assembly of genomes from high-throughput short reads is an active area of research. Several promising methods have been recently developed, with applicability mainly re...
Benjamin G. Jackson, Patrick S. Schnable, Srinivas...
130
Voted
ATAL
2009
Springer
15 years 10 months ago
Using rituals to express cultural differences in synthetic characters
There is currently an ongoing demand for richer Intelligent Virtual Environments (IVEs) populated with social intelligent agents. As a result, many agent architectures are taking ...
Samuel Mascarenhas, João Dias, Nuno Afonso,...
121
Voted
ESWS
2009
Springer
15 years 10 months ago
Collaborative Ocean Resource Interoperability: Multi-use of Ocean Data on the Semantic Web
: Earth Observations (EO) collect various characteristics of the objective environment using sensors which often have different measuring, spatial and temporal coverage. Making ind...
Feng (Barry) Tao, Jon Campbell, Maureen Pagnani, G...
RAID
2009
Springer
15 years 10 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
SERSCISA
2009
Springer
15 years 10 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
« Prev « First page 1491 / 1537 Last » Next »