Sciweavers

5009 search results - page 986 / 1002
» Value chain modelling using system dynamics
Sort
View
IJON
2000
104views more  IJON 2000»
13 years 9 months ago
Harmonic analysis of spiking neuronal pairs
Harmonic analysis is applied to analyze the transmission of bandlimited signals via spike trains generated by a pair of leaky integrate-and-fire (LIF) model neurons organized in a...
Charles H. Anderson, Qingfeng Huang, John W. Clark
GIS
2005
ACM
14 years 11 months ago
In-network surface simplification for sensor fields
Recent research literature on sensor network databases has focused on finding ways to perform in-network aggregation of sensor readings to reduce the message cost. However, with t...
Brian Harrington, Yan Huang
PODC
2009
ACM
14 years 10 months ago
Bounding the locality of distributed routing algorithms
d Abstract] Prosenjit Bose School of Computer Science Carleton University Ottawa, Canada jit@scs.carleton.ca Paz Carmi Dept. of Computer Science Ben-Gurion Univ. of the Negev Beer-...
Prosenjit Bose, Paz Carmi, Stephane Durocher
GRC
2007
IEEE
14 years 4 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
ECOOP
2005
Springer
14 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...