Sciweavers

688 search results - page 135 / 138
» Computational Methods for Verification of Stochastic Hybrid ...
Sort
View
SI3D
2003
ACM
14 years 26 days ago
Large haptic topographic maps: marsview and the proxy graph algorithm
In this paper we develop an interactive 3D browser for large topographic maps using a visual display augmented by a haptic, or force feedback, display. The extreme size of our dat...
Sean P. Walker, John Kenneth Salisbury Jr.
HUC
2010
Springer
13 years 8 months ago
MoviPill: improving medication compliance for elders using a mobile persuasive social game
Medication compliance is a critical component in the success of any medical treatment. However, only 50% of patients correctly adhere to their prescription regimens. Mobile and ub...
Rodrigo de Oliveira, Mauro Cherubini, Nuria Oliver
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 6 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
PADL
2009
Springer
14 years 8 months ago
Layered Models Top-Down Querying of Normal Logic Programs
Abstract. For practical applications, the use of top-down query-driven proofprocedures is essential for an efficient use and computation of answers using Logic Programs as knowledg...
Alexandre Miguel Pinto, Luís Moniz Pereira
MOBIHOC
2000
ACM
13 years 12 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones