Sciweavers

5493 search results - page 1053 / 1099
» Effectively Polynomial Simulations
Sort
View
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
LEGE
2003
107views Education» more  LEGE 2003»
13 years 9 months ago
Design Considerations for an ELeGI Portal
ELeGI, the European Learning Grid Infrastructure, has the ambitious goal of fostering effective learning and knowledge construction through the dynamic provision of service-based ...
Colin Allison, Rosa Michaelson
WSCG
2004
188views more  WSCG 2004»
13 years 9 months ago
Recognition of Motor Imagery Electroencephalography Using Independent Component Analysis and Machine Classifiers
Motor imagery electroencephalography (EEG), which embodies cortical potentials during mental simulation of left or right finger lifting tasks, can be used as neural input signals ...
Chih-I. Hung, Po-Lei Lee, Yu-Te Wu, Hui-Yun Chen, ...
MASCOTS
2003
13 years 9 months ago
Using User Interface Event Information in Dynamic Voltage Scaling Algorithms
Increasingly, mobile computers use dynamic voltage scaling (DVS) to reduce CPU voltage and speed and thereby increase battery life. To determine how to change voltage and speed wh...
Jacob R. Lorch, Alan Jay Smith
MLMTA
2003
13 years 9 months ago
Using a Two-Layered Case-Based Reasoning for Prediction in Soccer Coach
Abstract— The prediction of the future states in MultiAgent Systems has been a challenging problem since the begining of MAS. Robotic soccer is a MAS environment in which the pre...
Mazda Ahmadi, Abolfazl Keighobadi Lamjiri, Mayssam...
« Prev « First page 1053 / 1099 Last » Next »