Sciweavers

347 search results - page 57 / 70
» Modeling Human-Agent Interaction Using Bayesian Network Tech...
Sort
View
TMC
2012
11 years 9 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 24 days ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
Tools enabling the elucidation of molecular pathways active in human disease: Application to Hepatitis C virus infection
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...
ISMAR
2007
IEEE
14 years 1 months ago
Visualizing Occluded Physical Objects in Unfamiliar Outdoor Augmented Reality Environments
This paper describes techniques to allow both the visualization of hidden objects, and removal of real objects, for a mobile augmented reality user. A gesture based technique is a...
Ben Avery, Wayne Piekarski, Bruce H. Thomas
ICCS
2005
Springer
14 years 28 days ago
A Computational Model of Micro-vascular Growth
In order to supply a growing tissue with oxygen and nutrients and to remove its metabolic wastes, blood vessels penetrating the tissue are formed. Multiple mechanisms are involved ...
Dominik Szczerba, Gábor Székely