Sciweavers

2607 search results - page 486 / 522
» On the Architecture of System Verification Environments
Sort
View
BMCBI
2007
126views more  BMCBI 2007»
13 years 7 months ago
Using gene expression data and network topology to detect substantial pathways, clusters and switches during oxygen deprivation
Background: Biochemical investigations over the last decades have elucidated an increasingly complete image of the cellular metabolism. To derive a systems view for the regulation...
Gunnar Schramm, Marc Zapatka, Roland Eils, Rainer ...
TROB
2002
244views more  TROB 2002»
13 years 7 months ago
Distributed surveillance and reconnaissance using multiple autonomous ATVs: CyberScout
The objective of the CyberScout project is to develop an autonomous surveillance and reconnaissance system using a network of all-terrain vehicles. In this paper, we focus on two f...
Mahesh Saptharishi, C. Spence Oliver, Christopher ...
MOBIHOC
2010
ACM
13 years 5 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang
EDBT
1990
ACM
108views Database» more  EDBT 1990»
13 years 11 months ago
Deductive Databases - Theory Meets Practice
Deductive Databases are coming of age with the emergence of efficient and easy to use systems that support queries, reasoning, and application development on databases through dec...
Carlo Zaniolo
FLAIRS
2007
13 years 9 months ago
Explaining Task Processing in Cognitive Assistants that Learn
As personal assistant software matures and assumes more autonomous control of its users’ activities, it becomes more critical that this software can explain its task processing....
Deborah L. McGuinness, Alyssa Glass, Michael Wolve...