Sciweavers

4469 search results - page 845 / 894
» Comparing and Combining Profiles
Sort
View
132
Voted
CCS
2010
ACM
15 years 4 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
156
Voted
CLEF
2008
Springer
15 years 4 months ago
Diversity in Image Retrieval: DCU at ImageCLEFPhoto 2008
DCU participated in the ImageCLEF 2008 photo retrieval task, which aimed to evaluate diversity in Image Retrieval, submitting runs for both the English and Random language annotati...
Neil O'Hare, Peter Wilkins, Cathal Gurrin, Eamonn ...
123
Voted
CLEF
2009
Springer
15 years 4 months ago
UNIBA-SENSE @ CLEF 2009: Robust WSD Task
This paper presents the participation of the semantic N-levels search engine SENSE at the CLEF 2009 Ad Hoc Robust-WSD Task. During the participation at the same task of CLEF 2008,...
Pierpaolo Basile, Annalina Caputo, Giovanni Semera...
176
Voted
EMSOFT
2008
Springer
15 years 4 months ago
On the interplay of dynamic voltage scaling and dynamic power management in real-time embedded applications
Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM) are two popular techniques commonly employed to save energy in real-time embedded systems. DVS policies aim at red...
Vinay Devadas, Hakan Aydin
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
15 years 4 months ago
Managing team-based problem solving with symbiotic bid-based genetic programming
Bid-based Genetic Programming (GP) provides an elegant mechanism for facilitating cooperative problem decomposition without an a priori specification of the number of team member...
Peter Lichodzijewski, Malcolm I. Heywood