Sciweavers

599 search results - page 86 / 120
» Hide-and-Seek with Directional Sensing
Sort
View
ENTCS
2008
92views more  ENTCS 2008»
13 years 10 months ago
Redundancy Elimination for LF
We present a type system extending the dependent type theory LF, whose terms are more amenable to compact representation. This is achieved by carefully omitting certain subterms w...
Jason Reed
COMPUTER
2006
87views more  COMPUTER 2006»
13 years 10 months ago
What Can We Expect from Program Verification?
The role of intuition in software development was discussed in a most original fashion by Peter Naur in 1984. Yet there has been little subsequent interest in elaborating on Naur&#...
Michael Jackson
EJIS
2006
79views more  EJIS 2006»
13 years 10 months ago
Agility through scenario development and continuous implementation: a global aftermarket logistics case
This paper examines a business and IS/IT initiative at Volvo that involves managing the development and implementation of an agile aftermarket supply chain. The case is based on V...
Magnus Holmqvist, Kalevi Pessi
JCM
2008
77views more  JCM 2008»
13 years 9 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
JCP
2008
151views more  JCP 2008»
13 years 9 months ago
The Emotion Sign: Human Motion Analysis Classifying Specific Emotion
We examine the relationship between human motion and emotions. With recent improvement of sensing technologies, although precise human motion can be measured, the amount of data gr...
Yuichi Kobayashi