Sciweavers

3011 search results - page 282 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
136
Voted
JMLR
2010
145views more  JMLR 2010»
14 years 10 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
JPDC
2006
187views more  JPDC 2006»
15 years 3 months ago
Maximum lifetime data sensing and extraction in energy constrained networked sensor systems
We focus on data gathering problems in energy constrained networked sensor systems. The system operates in rounds where a subset of the sensors generate a certain number of data p...
Bo Hong, Viktor K. Prasanna
188
Voted
ISW
2010
Springer
15 years 1 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
126
Voted
AFRIGRAPH
2003
ACM
15 years 8 months ago
Psychophysically based artistic techniques for increased perceived realism of virtual environments
The perceived realism of a computer generated image depends on the accuracy of the modeling and illumination calculations, the limitations of the display device, and the way in wh...
Peter Longhurst, Patrick Ledda, Alan Chalmers
181
Voted
HASE
2002
IEEE
15 years 8 months ago
An Approach to Specify and Test Component-Based Dependable Software
Components (in-house or pre-fabricated) are increasingly being used to reduce the cost of software development. Given that these components may not have not been developed with de...
Arshad Jhumka, Martin Hiller, Neeraj Suri