Sciweavers

221 search results - page 44 / 45
» Frugal Sensor Assignment
Sort
View
RAID
2005
Springer
13 years 11 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
COMPGEOM
2004
ACM
13 years 11 months ago
Low-dimensional embedding with extra information
A frequently arising problem in computational geometry is when a physical structure, such as an ad-hoc wireless sensor network or a protein backbone, can measure local information...
Mihai Badoiu, Erik D. Demaine, Mohammad Taghi Haji...
ICRA
2002
IEEE
96views Robotics» more  ICRA 2002»
13 years 10 months ago
Mobility Enhancements to the Scout Robot Platform
When a distributed robotic system is assigned to perform reconnaissance or surveillance, restrictions inherent to the design of an individual robot limit the system’s performanc...
Andrew Drenner, Ian T. Burt, Tom Dahlin, Bradley K...
AAMAS
2008
Springer
13 years 5 months ago
Automated organization design for multi-agent systems
The ability to create effective multi-agent organizations is key to the development of larger, more diverse multi-agent systems. In this article we present KB-ORG: a fully automate...
Mark Sims, Daniel D. Corkill, Victor R. Lesser
BMCBI
2008
110views more  BMCBI 2008»
13 years 5 months ago
Enhancing the prediction of protein pairings between interacting families using orthology information
Background: It has repeatedly been shown that interacting protein families tend to have similar phylogenetic trees. These similarities can be used to predicting the mapping betwee...
José M. G. Izarzugaza, David de Juan, Carle...