Sciweavers

14190 search results - page 2836 / 2838
» computer 2008
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
IDA
2008
Springer
13 years 9 months ago
ExpertDiscovery system application for the hierarchical analysis of eukaryotic transcription regulatory regions based on DNA cod
We developed Relational Data Mining approach which allows to overcome essential limitations of the Data Mining and Knowledge Discovery techniques. In the paper the approach was im...
I. V. Khomicheva, Eugenii E. Vityaev, Elena A. Ana...
IVC
2007
173views more  IVC 2007»
13 years 9 months ago
Outdoor recognition at a distance by fusing gait and face
We explore the possibility of using both face and gait in enhancing human recognition at a distance performance in outdoor conditions. Although the individual performance of gait ...
Zongyi Liu, Sudeep Sarkar
MMS
2008
13 years 9 months ago
Mobile cinema: canonical processes for video adaptation
Nowadays, users not only want to watch digital videos on a PC but also use mobile devices to play back multimedia content. Video adaptation algorithms enable the visualization of ...
Stephan Kopf, Wolfgang Effelsberg
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 8 months ago
Unified storage systems for distributed Tier-2 centres
The start of data taking at the Large Hadron Collider will herald a new era in data volumes and distributed processing in particle physics. Data volumes of hundreds of Terabytes wi...
Greig A. Cowan, Graeme A. Stewart, Andrew Elwell
« Prev « First page 2836 / 2838 Last » Next »