Sciweavers

7315 search results - page 1451 / 1463
» Peer-to-Peer Information Search
Sort
View
ISI
2006
Springer
13 years 7 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
JSAC
2008
140views more  JSAC 2008»
13 years 7 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
JCP
2006
151views more  JCP 2006»
13 years 7 months ago
Simulated Annealing based Wireless Sensor Network Localization
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
DSS
2007
226views more  DSS 2007»
13 years 7 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
JIB
2006
106views more  JIB 2006»
13 years 7 months ago
A structural keystone for drug design
3D-structures of proteins and potential ligands are the cornerstones of rational drug design. The first brick to build upon is selecting a protein target and finding out whether b...
Kristian Rother, Mathias Dunkel, Elke Michalsky, S...
« Prev « First page 1451 / 1463 Last » Next »