Sciweavers

38 search results - page 7 / 8
» Consequences and Limits of Nonlocal Strategies
Sort
View
CIE
2010
Springer
15 years 3 months ago
How Powerful Are Integer-Valued Martingales?
In the theory of algorithmic randomness, one of the central notions is that of computable randomness. An infinite binary sequence X is computably random if no recursive martingale...
Laurent Bienvenu, Frank Stephan, Jason Teutsch
JSAC
2010
188views more  JSAC 2010»
14 years 6 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
DAGSTUHL
2007
15 years 1 months ago
End-User Development Techniques for Enterprise Resource Planning Software Systems
Abstract. The intent of this position paper is to present the focus of interest of our end-user development (EUD) related research at SAP Research CEC Darmstadt, enabling other par...
Michael Spahn, Stefan Scheidl, Todor Stoitsev
115
Voted
BMCBI
2008
141views more  BMCBI 2008»
14 years 11 months ago
Ontology-guided data preparation for discovering genotype-phenotype relationships
Complexity of post-genomic data and multiplicity of mining strategies are two limits to Knowledge Discovery in Databases (KDD) in life sciences. Because they provide a semantic fr...
Adrien Coulet, Malika Smaïl-Tabbone, Pascale ...
ATAL
2010
Springer
15 years 22 days ago
Decentralized hash tables for mobile robot teams solving intra-logistics tasks
Although a remarkably high degree of automation has been reached in production and intra-logistics nowadays, human labor is still used for transportation using handcarts and forkl...
D. Sun, A. Kleiner, Christian Schindelhauer