Sciweavers

1663 search results - page 140 / 333
» Computer Security in the Real World
Sort
View
158
Voted
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
102
Voted
ACSC
2003
IEEE
15 years 9 months ago
Symbol Grounding and its Implications for Artificial Intelligence
In response to Searle's well-known Chinese room argument against Strong AI (and more generally, computationalism), Harnad proposed that if the symbols manipulated by a robot ...
Michael J. Mayo
112
Voted
BRAIN
2009
Springer
15 years 10 months ago
Data Explosion, Data Nature and Dataology
The essence of computer applications is to store things in the real world into computer systems in the form of data, i.e., it is a process of producing data. Some data are the reco...
Yangyong Zhu, Ning Zhong, Yun Xiong
124
Voted
PERVASIVE
2004
Springer
15 years 9 months ago
"Are You with Me?" - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person
As the proliferation of pervasive and ubiquitous computing devices continues, users will carry more devices. Without the ability for these devices to unobtrusively interact with on...
Jonathan Lester, Blake Hannaford, Gaetano Borriell...
122
Voted
CCR
2010
97views more  CCR 2010»
15 years 1 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman