Sciweavers

403 search results - page 80 / 81
» Insight knowledge in search based software testing
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 3 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
PAMI
2010
351views more  PAMI 2010»
13 years 8 months ago
Evaluating Color Descriptors for Object and Scene Recognition
—Image category recognition is important to access visual information on the level of objects and scene types. So far, intensity-based descriptors have been widely used for featu...
Koen E. A. van de Sande, Theo Gevers, Cees G. M. S...
ATAL
2011
Springer
12 years 10 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
SIGUCCS
2005
ACM
14 years 3 months ago
Developing a synchronous web seminar application for online learning
Many higher education institutions are searching for cost effective tools for the delivery of a feature rich, synchronous online learning environment. While there are several comm...
Michael D. Ciocco, Neil Toporski, Michael Dorris
BMCBI
2010
128views more  BMCBI 2010»
13 years 10 months ago
VIGOR, an annotation program for small viral genomes
Background: The decrease in cost for sequencing and improvement in technologies has made it easier and more common for the re-sequencing of large genomes as well as parallel seque...
Shiliang Wang, Jaideep P. Sundaram, David Spiro