Sciweavers

17552 search results - page 3436 / 3511
» Signal-regulated systems and networks
Sort
View
DGO
2009
111views Education» more  DGO 2009»
13 years 10 months ago
"Integrated" and "transcendent" e-government: keys for analyzing organizational structure and governance
As e-government enters the "transformation" phase, public authorities face major challenges in terms of governance and leadership. The present article consolidates prior...
Beat Estermann, Reinhard Riedl, Alessia C. Neuroni
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
13 years 10 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi
MOBICOM
2010
ACM
13 years 9 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...
PETRA
2010
ACM
13 years 9 months ago
Optimizing pervasive sensor data acquisition utilizing missing values substitution
Acquisition of pervasive sensor data can be often unsuccessful due to power outage at nodes, time synchronization issues, interference, network transmission failures or sensor har...
M. Michalopoulos, Christos Anagnostopoulos, Charal...
CCS
2010
ACM
13 years 9 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
« Prev « First page 3436 / 3511 Last » Next »