Sciweavers

2373 search results - page 423 / 475
» Towards a Model of Computer Systems Research
Sort
View
WSC
2007
15 years 6 months ago
Self organized UAV swarm planning optimization for search and destroy using SWARMFARE simulation
As military interest continues to grow for Unmanned Aerial Vehicle (UAV) capabilities, the Air Force is exploring UAV autonomous control, mission planning and optimization techniq...
Dustin J. Nowak, Ian C. Price, Gary B. Lamont
CSREAESA
2004
15 years 5 months ago
An Energy-Aware Synthesis Methodology for OS-Driven Multi-Process Embedded Software
The growing software content in various battery-driven embedded systems has led to significant interest in technologies for energy-efficient embedded software. While lowenergy sof...
Tat Kee Tan, Anand Raghunathan, Niraj K. Jha
IJIM
2008
60views more  IJIM 2008»
15 years 4 months ago
The Role of Podcasts in Students' Learning
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can ac...
Laurel Evelyn Dyson
JUCS
2008
157views more  JUCS 2008»
15 years 4 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
RAID
1999
Springer
15 years 8 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo