Sciweavers

7741 search results - page 1418 / 1549
» Security in Active Networks
Sort
View
ICASSP
2009
IEEE
15 years 11 months ago
Multi-channel audio segmentation for continuous observation and archival of large spaces
In most real-world situations, a single microphone is insufficient for the characterization of an entire auditory scene. This often occurs in places such as office environments ...
Gordon Wichern, Harvey D. Thornburg, Andreas Spani...
ICPP
2009
IEEE
15 years 11 months ago
Group Operation Assembly Language - A Flexible Way to Express Collective Communication
—The implementation and optimization of collective communication operations is an important field of active research. Such operations directly influence application performance...
Torsten Hoefler, Christian Siebert, Andrew Lumsdai...
UIC
2009
Springer
15 years 11 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 11 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
150
Voted
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 11 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a ...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
« Prev « First page 1418 / 1549 Last » Next »