Sciweavers

6709 search results - page 1154 / 1342
» Impacting the Learning Experience
Sort
View
IPCCC
2007
IEEE
14 years 5 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
IPPS
2007
IEEE
14 years 5 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
IPPS
2007
IEEE
14 years 5 months ago
Scalable, Dynamic Analysis and Visualization for Genomic Datasets
A challenge in data analysis and visualization is to build new-generation software tools and systems to truly accelerate scientific discoveries. The recent focus of Princeton’s ...
Grant Wallace, Matthew A. Hibbs, Maitreya J. Dunha...
IROS
2007
IEEE
138views Robotics» more  IROS 2007»
14 years 5 months ago
On-demand sharing of a high-resolution panorama video from networked robotic cameras
— Due to their flexibility in coverage and resolution, networked robotic cameras become more and more popular in applications such as natural observation, security surveillance,...
Ni Qin, Dezhen Song
IROS
2007
IEEE
100views Robotics» more  IROS 2007»
14 years 5 months ago
Incremental behavior acquisition based on reliability of observed behavior recognition
— We propose a novel approach for acquisition and development of behaviors through observation in multi-agent environment. Observed behaviors of others give fruitful hints for a ...
Tomoki Nishi, Yasutake Takahashi, Minoru Asada
« Prev « First page 1154 / 1342 Last » Next »