Sciweavers

5863 search results - page 1074 / 1173
» On Model-Checking of P Systems
Sort
View
154
Voted
ICEIS
2010
IEEE
15 years 1 months ago
Pattern Recognition as a Human Centered non-Euclidean Problem
Regularities in the world are human defined. Patterns in the observed phenomena are there because we define and recognize them as such. Automatic pattern recognition tries to bridg...
Robert P. W. Duin
ISOLA
2010
Springer
15 years 1 months ago
Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins
In the Taverna workflow design and enactment tool, users often find it difficult to both manually discover a service or workflow fragment that executes a desired operation on a pie...
David Withers, Edward A. Kawas, E. Luke McCarthy, ...
183
Voted
ISVD
2010
IEEE
15 years 1 months ago
Hydration Shells in Voronoi Tessellations
An interesting property of the Voronoi tessellation is studied in the context of its application to the analysis of hydration shells in computer simulation of solutions. Namely the...
V. P. Voloshin, Alexey V. Anikeenko, Nikolai N. Me...
183
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
138
Voted
RAID
2010
Springer
15 years 1 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
« Prev « First page 1074 / 1173 Last » Next »