Sciweavers

204 search results - page 37 / 41
» Environment Authentication Through 3D Structural Analysis
Sort
View
TMC
2012
11 years 10 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
AI
2005
Springer
13 years 7 months ago
Semiotic schemas: A framework for grounding language in action and perception
A theoretical framework for grounding language is introduced that provides a computational path from sensing and motor action to words and speech acts. The approach combines conce...
Deb Roy
SIGSOFT
2005
ACM
14 years 8 months ago
Automatic generation of suggestions for program investigation
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to...
Martin P. Robillard
BMCBI
2006
180views more  BMCBI 2006»
13 years 7 months ago
The Gaggle: An open-source software system for integrating bioinformatics software and data sources
Background: Systems biologists work with many kinds of data, from many different sources, using a variety of software tools. Each of these tools typically excels at one type of an...
Paul T. Shannon, David J. Reiss, Richard Bonneau, ...
MICRO
2002
IEEE
100views Hardware» more  MICRO 2002»
14 years 11 days ago
Microarchitectural exploration with Liberty
To find the best designs, architects must rapidly simulate many design alternatives and have confidence in the results. Unfortunately, the most prevalent simulator construction ...
Manish Vachharajani, Neil Vachharajani, David A. P...