Sciweavers

15792 search results - page 3080 / 3159
» Computational Abstraction Steps
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
DCOSS
2005
Springer
14 years 3 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
DILS
2005
Springer
14 years 3 months ago
Information Integration and Knowledge Acquisition from Semantically Heterogeneous Biological Data Sources
Abstract. We present INDUS (Intelligent Data Understanding System), a federated, query-centric system for knowledge acquisition from autonomous, distributed, semantically heterogen...
Doina Caragea, Jyotishman Pathak, Jie Bao, Adrian ...
DIS
2005
Springer
14 years 3 months ago
Support Vector Inductive Logic Programming
Abstract. In this paper we explore a topic which is at the intersection of two areas of Machine Learning: namely Support Vector Machines (SVMs) and Inductive Logic Programming (ILP...
Stephen Muggleton, Huma Lodhi, Ata Amini, Michael ...
ECAL
2005
Springer
14 years 3 months ago
A Self-organising, Self-adaptable Cellular System
Abstract. Inspired by the recent advances in evolutionary biology, we have developed a self-organising, self-adaptable cellular system for multitask learning. The main aim of our p...
Lucien Epiney, Mariusz Nowostawski
« Prev « First page 3080 / 3159 Last » Next »