Sciweavers

4048 search results - page 525 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
15 years 11 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
ICRA
2008
IEEE
152views Robotics» more  ICRA 2008»
15 years 11 months ago
A line-based obstacle avoidance technique for dexterous manipulator operations
Title of thesis: A LINE-BASED OBSTACLE AVOIDANCE TECHNIQUE FOR DEXTEROUS MANIPULATOR OPERATIONS Nicholas Anthony Scott Master of Science, 2007 Thesis directed by: Craig Carignan D...
Nicholas A. Scott, Craig R. Carignan
CCGRID
2007
IEEE
15 years 11 months ago
Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
While a grid represents a computing infrastructure for cross domain sharing of computational resources, the cyberinfrastructure, proposed by the US NSF Blue – Ribbon advisory pa...
Jie Yin, Junwei Cao, Yuexuan Wang, Lianchen Liu, C...
124
Voted
CEC
2007
IEEE
15 years 11 months ago
Clonal particle swarm optimization and its applications
— Particle swarm optimization (PSO) is a stochastic global optimization algorithm inspired by social behavior of bird flocking in search for food, which is a simple but powerful...
Y. Tan, Z. M. Xiao
114
Voted
CEC
2007
IEEE
15 years 11 months ago
Constrained genetic algorithm based independent component analysis
Independent Component Analysis, a computationally efficient statistical signal processing technique, has been an area of interest for researchers for many practical applications in...
D. P. Acharya, Ganapati Panda, Y. V. S. Lakshmi