Sciweavers

504 search results - page 93 / 101
» Explaining Verification Conditions
Sort
View
IWCMC
2010
ACM
13 years 11 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
MVA
2007
211views Computer Vision» more  MVA 2007»
13 years 10 months ago
Vision-based UAV Navigation in Mountain Area
Most vision-based UAV (Unmanned Aerial Vehicle) navigation algorithms extract manmade features such as buildings or roads, which are well structured in urban terrain, using the CC...
Jihwan Woo, Kilho Son, Teng Li, Gwan Sung Kim, In-...
BMCBI
2008
83views more  BMCBI 2008»
13 years 9 months ago
Prioritization of gene regulatory interactions from large-scale modules in yeast
Background: The identification of groups of co-regulated genes and their transcription factors, called transcriptional modules, has been a focus of many studies about biological s...
Ho-Joon Lee, Thomas Manke, Ricardo Bringas, Martin...
COMGEO
2010
ACM
13 years 9 months ago
Exact join detection for convex polyhedra and other numerical abstractions
r Numerical Abstractions6 Roberto Bagnaraa , Patricia M. Hillb , Enea Zaffanellaa aDepartment of Mathematics, University of Parma, Italy bSchool of Computing, University of Leeds, ...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
JSAC
2008
199views more  JSAC 2008»
13 years 9 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed