Sciweavers

347 search results - page 53 / 70
» Some Second Order Set Theory
Sort
View
ADHOCNETS
2009
Springer
14 years 4 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
PERSUASIVE
2007
Springer
14 years 3 months ago
Fine Tuning the Persuasion in Persuasive Games
Persuasive games are a relatively new phenomenon, and hold promise as effective vehicles for persuasion. As yet, however, there are few set rules guiding how to design persuasive ...
Rilla Khaled, Pippin Barr, James Noble, Ronald Fis...
EUSFLAT
2007
140views Fuzzy Logic» more  EUSFLAT 2007»
13 years 11 months ago
A Fuzzy Formal Logic for Interval-valued Residuated Lattices
Fuzzy formal logics were introduced in order to handle graded truth values instead of only ‘true’ and ‘false’. A wide range of such logics were introduced successfully, li...
Bart Van Gasse, Chris Cornelis, Glad Deschrijver, ...
SIAMREV
2010
170views more  SIAMREV 2010»
13 years 4 months ago
Network Properties Revealed through Matrix Functions
The newly emerging field of Network Science deals with the tasks of modelling, comparing and summarizing large data sets that describe complex interactions. Because pairwise affin...
Ernesto Estrada, Desmond J. Higham
ICDT
2011
ACM
270views Database» more  ICDT 2011»
13 years 1 months ago
On the equivalence of distributed systems with queries and communication
Distributed data management systems consist of peers that store, exchange and process data in order to collaboratively achieve a common goal, such as evaluate some query. We study...
Serge Abiteboul, Balder ten Cate, Yannis Katsis