Sciweavers

5234 search results - page 1047 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJRR
2010
173views more  IJRR 2010»
13 years 5 months ago
Planning and Implementing Trajectories for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions
Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is b...
Ryan N. Smith, Yi Chao, Peggy Li, David A. Caron, ...
BMCBI
2011
13 years 2 months ago
Motif-guided sparse decomposition of gene expression data for regulatory module identification
Background: Genes work coordinately as gene modules or gene networks. Various computational approaches have been proposed to find gene modules based on gene expression data; for e...
Ting Gong, Jianhua Xuan, Li Chen, Rebecca B. Riggi...
COMSNETS
2012
297views more  COMSNETS 2012»
12 years 2 months ago
Optimizing cloud resources for delivering IPTV services through virtualization
—Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. However, achieving simila...
Vaneet Aggarwal, Vijay Gopalakrishnan, Rittwik Jan...
MVA
2000
249views Computer Vision» more  MVA 2000»
13 years 8 months ago
3D City Modeling with Laser Range Data and 2D Maps
Visualizations and simulations in an urban environment need 3D digital maps rather than traditional 2D maps, and constructing 3D maps from multiple data sources has become a promi...
Pingtao Wang, Takeshi Doihara, Kazuo Oda, Wei Lu
« Prev « First page 1047 / 1047 Last » Next »