Sciweavers

37217 search results - page 7390 / 7444
» or 2010
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 3 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
COST
2010
Springer
194views Multimedia» more  COST 2010»
13 years 3 months ago
The MultiLis Corpus - Dealing with Individual Differences in Nonverbal Listening Behavior
Abstract. Computational models that attempt to predict when a virtual human should backchannel are often based on the analysis of recordings of face-to-face conversations between h...
Iwan de Kok, Dirk Heylen
CSMR
2010
IEEE
13 years 3 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
DAC
2010
ACM
13 years 3 months ago
Node addition and removal in the presence of don't cares
This paper presents a logic restructuring technique named node addition and removal (NAR). It works by adding a node into a circuit to replace an existing node and then removing t...
Yung-Chih Chen, Chun-Yao Wang
MCM
2011
13 years 3 months ago
Circadian rhythm and cell population growth
Molecular circadian clocks, that are found in all nucleated cells of mammals, are known to dictate rhythms of approximately 24 hours (circa diem) to many physiological processes. ...
Jean Clairambault, Stéphane Gaubert, Thomas...
« Prev « First page 7390 / 7444 Last » Next »