Sciweavers

3955 search results - page 587 / 791
» Comparing the Power of Robots
Sort
View
APCHI
2008
IEEE
14 years 4 months ago
On Generating Backbone Trees through Robust Multi-hop Clusters in Wireless Sensor Networks
Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless...
Inyoung Shin, Moonseong Kim, Hyunseung Choo
BIBM
2008
IEEE
137views Bioinformatics» more  BIBM 2008»
14 years 4 months ago
Exploring Alternative Splicing Features Using Support Vector Machines
Alternative splicing is a mechanism for generating different gene transcripts (called isoforms) from the same genomic sequence. Finding alternative splicing events experimentally ...
Jing Xia, Doina Caragea, Susan Brown
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
14 years 4 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
CEC
2008
IEEE
14 years 4 months ago
Reduced polynomial neural swarm net for classification task in data mining
—In this paper, we proposed a reduced polynomial neural swarm net (RPNSN) for the task of classification. Classification task is one of the most studied tasks of data mining. In ...
Bijan Bihari Misra, Satchidananda Dehuri, Pradipta...
COMPSAC
2008
IEEE
14 years 4 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu