Sciweavers

159 search results - page 32 / 32
» Strategy evaluation in extensive games with importance sampl...
Sort
View
MOBISYS
2004
ACM
14 years 4 months ago
Energy-Efficient Surveillance System Using Wireless Sensor Networks
The focus of surveillance missions is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of ri...
Tian He, Sudha Krishnamurthy, John A. Stankovic, T...
IWDW
2007
Springer
13 years 11 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
AOSD
2005
ACM
13 years 10 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
BMCBI
2010
116views more  BMCBI 2010»
13 years 5 months ago
FiGS: a filter-based gene selection workbench for microarray data
Background: The selection of genes that discriminate disease classes from microarray data is widely used for the identification of diagnostic biomarkers. Although various gene sel...
Taeho Hwang, Choong-Hyun Sun, Taegyun Yun, Gwan-Su...