Sciweavers

6770 search results - page 1186 / 1354
» How GPUs Work
Sort
View
ICRA
2008
IEEE
136views Robotics» more  ICRA 2008»
14 years 3 months ago
Modeling multi-robot interaction using generalized occupancy grids, with application to reducing spatial interference
— As part of a program to find methods of reducing spatial interference in multi-robot systems, we propose the Interaction Grid (IG), a generalization of the Occupancy Grid that...
Mauricio Zuluaga, Richard T. Vaughan
ISDA
2008
IEEE
14 years 3 months ago
Combining Clustering and Bayesian Network for Gene Network Inference
Gene network reconstruction is a multidisciplinary research area involving data mining, machine learning, statistics, ontologies and others. Reconstructed gene network allows us t...
Suhaila Zainudin, Safaai Deris
ITNG
2008
IEEE
14 years 3 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
LCN
2008
IEEE
14 years 3 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
NDSS
2008
IEEE
14 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
« Prev « First page 1186 / 1354 Last » Next »