Sciweavers

8719 search results - page 1548 / 1744
» A Categorical Approach to Simulations
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 9 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
JBI
2011
249views Bioinformatics» more  JBI 2011»
14 years 9 months ago
A reusable framework for health counseling dialogue systems based on a behavioral medicine ontology
Automated approaches to promoting health behavior change, such as exercise, diet, and medication adherence promotion, have the potential for significant positive impact on society...
Timothy W. Bickmore, Daniel Schulman, Candace L. S...
135
Voted
TMM
2011
160views more  TMM 2011»
14 years 8 months ago
Routing-Aware Multiple Description Video Coding Over Mobile Ad-Hoc Networks
Abstract—Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. We propose a rout...
Yiting Liao, Jerry D. Gibson
TR
2011
106views more  TR 2011»
14 years 8 months ago
Exploring Complex Systems Aspects of Blackout Risk and Mitigation
Abstract—Electric power transmission systems are a key infrastructure, and blackouts of these systems have major consequences for the economy and national security. Analyses of b...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
BCB
2010
175views Bioinformatics» more  BCB 2010»
14 years 8 months ago
Gene set analysis using principal components
We present a new method for identifying gene sets associated with labeled samples, where the labels can be case versus control, or genotype differences. Existing approaches to thi...
Isa Kemal Pakatci, Wei Wang, Leonard McMillan
« Prev « First page 1548 / 1744 Last » Next »