Sciweavers

26496 search results - page 5294 / 5300
» An Approach to Computing Ethics
Sort
View
IPSN
2011
Springer
14 years 1 months ago
Localising speech, footsteps and other sounds using resource-constrained devices
While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and works...
Yukang Guo, Mike Hazas
IWQOS
2011
Springer
14 years 14 days ago
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Abstract—Cloud systems provide a cost-effective service hosting infrastructure for application service providers (ASPs). However, cloud systems are often shared by multiple tenan...
Juan Du, Xiaohui Gu, Nidhi Shah
JAIR
2011
214views more  JAIR 2011»
14 years 14 days ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
79
Voted
NAR
2011
216views Computer Vision» more  NAR 2011»
14 years 13 days ago
ChemProt: a disease chemical biology database
Systems pharmacology is an emergent area that studies drug action across multiple scales of complexity, from molecular and cellular to tissue and organism levels. There is a criti...
Olivier Taboureau, Sonny Kim Nielsen, Karine Audou...
NAR
2011
159views Computer Vision» more  NAR 2011»
14 years 13 days ago
SuperSweet - a resource on natural and artificial sweetening agents
A vast number of sweet tasting molecules are known, encompassing small compounds, carbohydrates, D-amino acids and large proteins. Carbohydrates play a particularly big role in hu...
Jessica Ahmed, Saskia Preissner, Mathias Dunkel, C...
« Prev « First page 5294 / 5300 Last » Next »