Sciweavers

1580 search results - page 231 / 316
» Non-Interference Through Determinism
Sort
View
SWARM
2010
SPRINGER
154views Optimization» more  SWARM 2010»
13 years 8 months ago
An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization
This paper proposes an immune concentration based virus detection approach which utilizes a two-element concentration vector to construct the feature. In this approach, ‘self’ ...
Wei Wang, Pengtao Zhang, Ying Tan
TMC
2010
152views more  TMC 2010»
13 years 8 months ago
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
—Location and intersensor distance estimations are important functions for the operation of wireless sensor networks, especially when protocols can benefit from the distance info...
Serdar Vural, Eylem Ekici
TON
2010
80views more  TON 2010»
13 years 8 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...
BMVC
2010
13 years 8 months ago
Implicit Shape Kernel for Discriminative Learning of the Hough Transform Detector
The Hough transform provides an efficient way to detect objects. Various methods have been proposed to achieve discriminative learning of the Hough transform, but they have usuall...
Yimeng Zhang, Tsuhan Chen
CHI
2010
ACM
13 years 8 months ago
The life and times of files and information: a study of desktop provenance
In the field of Human-Computer Interaction, provenance refers to the history and genealogy of a document or file. Provenance helps us to understand the evolution and relationships...
Carlos Jensen, Heather Lonsdale, Eleanor Wynn, Jil...