Sciweavers

7504 search results - page 1313 / 1501
» Computing with Action Potentials
Sort
View
128
Voted
MSWIM
2005
ACM
15 years 9 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
122
Voted
SAC
2005
ACM
15 years 9 months ago
Graphical rule-based representation of signal-transduction networks
The process by which a cell senses and responds to its environment, as in signal transduction, is often mediated by a network of protein-protein interactions, in which proteins co...
James R. Faeder, Michael L. Blinov, William S. Hla...
123
Voted
SAC
2005
ACM
15 years 9 months ago
Retrieving lightly annotated images using image similarities
Users’ search needs are often represented by words and images are retrieved according to such textual queries. Annotation words assigned to the stored images are most useful to ...
Masashi Inoue, Naonori Ueda
137
Voted
DIGRA
2005
Springer
15 years 9 months ago
The Nip and the Bite
An examination of the contributions that can be made by the field of non-mechanistic cybernetics (as elaborated by Gregory Bateson and Anthony Wilden) to a theory of videogames th...
Darshana Jayemanne
118
Voted
DRM
2005
Springer
15 years 9 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
« Prev « First page 1313 / 1501 Last » Next »