Sciweavers

699 search results - page 111 / 140
» On Objects and Events
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
CF
2006
ACM
14 years 2 months ago
Morphogenesis as an amorphous computation
In this paper, we present a programming language viewpoint for morphogenesis, the process of shape formation during embryological development. Specifically, we model morphogenesi...
Arnab Bhattacharyya
ASWEC
2005
IEEE
14 years 2 months ago
A UML Approach to the Generation of Test Sequences for Java-Based Concurrent Systems
Starting with a UML specification that captures the underlying functionality of some given Java-based concurrent system, we describe a systematic way to construct, from this speci...
Soon-Kyeong Kim, Luke Wildman, Roger Duke
CSB
2005
IEEE
141views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Reconstructing Phylogenetic Networks Using Maximum Parsimony
Phylogenies—the evolutionary histories of groups of organisms—are one of the most widely used tools throughout the life sciences, as well as objects of research within systema...
Luay Nakhleh, Guohua Jin, Fengmei Zhao, John M. Me...
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
14 years 2 months ago
HMM-Based Deception Recognition from Visual Cues
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment human...
Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Ad...