Sciweavers

1663 search results - page 95 / 333
» Computer Security in the Real World
Sort
View
JMLR
2010
162views more  JMLR 2010»
13 years 3 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...
NPL
2007
109views more  NPL 2007»
13 years 8 months ago
Generative Modeling of Autonomous Robots and their Environments using Reservoir Computing
Autonomous mobile robots form an important research topic in the field of robotics due to their near-term applicability in the real world as domestic service robots. These robots ...
Eric A. Antonelo, Benjamin Schrauwen, Jan M. Van C...
JASIS
2010
175views more  JASIS 2010»
13 years 3 months ago
The absence of creativity in Feist and the computational process
The decision of the United States Supreme Court in 1991 in Feist Publications, Inc. v. Rural Tel. Service Co. affirmed originality as a constitutional requirement for copyright. O...
Julian Warner
PERCOM
2003
ACM
14 years 8 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...
AINA
2007
IEEE
14 years 28 days ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...