Sciweavers

6610 search results - page 1028 / 1322
» Community Structures of Networks
Sort
View
CN
1999
128views more  CN 1999»
15 years 3 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
MICRO
2007
IEEE
113views Hardware» more  MICRO 2007»
15 years 3 months ago
The High Cost of a Cheap Lesson
y abstract, it is grounded in the experience of many markets. As I will illustrate, it explains much strategic behavior. Information spreads With a bit of effort, any technically s...
Shane Greenstein
HUC
2010
Springer
15 years 2 months ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
ICRA
2010
IEEE
220views Robotics» more  ICRA 2010»
15 years 2 months ago
Autonomous Underwater Vehicle trajectory design coupled with predictive ocean models: A case study
— Data collection using Autonomous Underwater Vehicles (AUVs) is increasing in importance within the oceanographic research community. Contrary to traditional moored or static pl...
Ryan N. Smith, Arvind Pereira, Yi Chao, Peggy Li, ...
IJRR
2010
173views more  IJRR 2010»
15 years 2 months ago
Planning and Implementing Trajectories for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions
Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is b...
Ryan N. Smith, Yi Chao, Peggy Li, David A. Caron, ...
« Prev « First page 1028 / 1322 Last » Next »