Sciweavers

411 search results - page 49 / 83
» Technological Strategy of Using Global Positioning System: A...
Sort
View
ANTSW
2008
Springer
13 years 11 months ago
Lattice Formation in Space for a Swarm of Pico Satellites
We present a distributed control strategy that lets a swarm of satellites autonomously form a lattice in orbit around a planet. The system, based on the artificial potential field ...
Carlo Pinciroli, Mauro Birattari, Elio Tuci, Marco...
HVEI
2010
13 years 7 months ago
Quantifying the relationship between visual salience and visual importance
This paper presents the results of two psychophysical experiments and an associated computational analysis designed to quantify the relationship between visual salience and visual...
Junle Wang, Damon M. Chandler, Patrick Le Callet
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
ATAL
2004
Springer
14 years 2 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
BMCBI
2005
212views more  BMCBI 2005»
13 years 8 months ago
PAGE: Parametric Analysis of Gene Set Enrichment
Background: Gene set enrichment analysis (GSEA) is a microarray data analysis method that uses predefined gene sets and ranks of genes to identify significant biological changes i...
Seon-Young Kim, David J. Volsky