Sciweavers

2763 search results - page 15 / 553
» The Dangerous 'All' in Specifications
Sort
View
IE
2007
13 years 9 months ago
An evaluation framework for videogame based tasking of remote vehicles
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
Adam J. Hassell, Philip Smith, David Stratton
GISCIENCE
2010
Springer
215views GIS» more  GISCIENCE 2010»
13 years 8 months ago
Microtheories for Spatial Data Infrastructures - Accounting for Diversity of Local Conceptualizations at a Global Level
The categorization of our environment into feature types is an essential prerequisite for cartography, geographic information retrieval, routing applications, spatial decision supp...
Stephanie Duce, Krzysztof Janowicz
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 8 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
NETWORKS
2006
13 years 7 months ago
Black hole search in common interconnection networks
Mobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that de...
Stefan Dobrev, Paola Flocchini, Rastislav Kralovic...
JOT
2010
114views more  JOT 2010»
13 years 6 months ago
Semantic Annotation for Java
This paper describes how to use annotation to provide semantic information. The applications include the automatic construction of a GUI so that the user input is constrained to a...
Douglas Lyon