Sciweavers

1096 search results - page 106 / 220
» Computation Slicing: Techniques and Theory
Sort
View
SASN
2004
ACM
14 years 2 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ML
2006
ACM
143views Machine Learning» more  ML 2006»
13 years 9 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
CIE
2004
Springer
13 years 9 months ago
Automating Lighting Design for Interactive Entertainment
Recent advances in computer graphics, particularly in real-time rendering, have caused major improvements in 3D graphics and rendering techniques used in interactive entertainment...
Magy Seif El-Nasr, Ian Horswill
PDC
2004
ACM
14 years 2 months ago
The impact of participation in information system design: a comparison of contextual placements
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Magnus Irestig, Henrik Eriksson, Toomas Timpka
EUSAI
2007
Springer
14 years 3 months ago
Distributed AI for Ambient Intelligence: Issues and Approaches
Abstract. Research in many fields of AI, such as distributed planning and reasoning, agent teamwork and coalition formation, cooperative problem solving and action theory has adva...
Theodore Patkos, Antonis Bikakis, Grigoris Antonio...