Sciweavers

6258 search results - page 1058 / 1252
» Applied Text Generation
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
COR
2007
183views more  COR 2007»
15 years 4 months ago
Arcs-states models for the vehicle routing problem with time windows and related problems
This paper presents several Arcs-States models that can be applied to numerous vehicle routing problems, one of which is the well-known vehicle routing problem with capacities and...
Thierry Mautor, Edith Naudin
138
Voted
JCP
2008
151views more  JCP 2008»
15 years 4 months ago
The Emotion Sign: Human Motion Analysis Classifying Specific Emotion
We examine the relationship between human motion and emotions. With recent improvement of sensing technologies, although precise human motion can be measured, the amount of data gr...
Yuichi Kobayashi
JCP
2008
117views more  JCP 2008»
15 years 4 months ago
Selfish Constraint Satisfaction Genetic Algorithm for Planning a Long-distance Transportation Network
To build a cooperative logistics network covering multiple enterprises, a planning method that can build a long-distance transportation network is required. Many strict constraints...
Takashi Onoyama, Takuya Maekawa, Yoshitaka Sakurai...
JFR
2008
87views more  JFR 2008»
15 years 4 months ago
Robust vision-based underwater homing using self-similar landmarks
Next generation Autonomous Underwater Vehicles (AUVs) will be required to robustly identify underwater targets for tasks such as inspection, localization and docking. Given their ...
Amaury Nègre, Cédric Pradalier, Matt...
« Prev « First page 1058 / 1252 Last » Next »