Sciweavers

2006 search results - page 267 / 402
» Heuristic Security-Testing Methods
Sort
View
ENC
2007
IEEE
15 years 7 months ago
fMRI Brain Image Retrieval Based on ICA Components
This manuscript proposes a retrieval system for fMRI brain images. Our goal is to find a similaritymetric to enable us to support queries for “similar tasks” for retrieval on...
Bing Bai, Paul B. Kantor, Ali Shokoufandeh, Debora...
115
Voted
IJCNN
2007
IEEE
15 years 7 months ago
DHP-Based Wide-Area Coordinating Control of a Power System with a Large Wind Farm and Multiple FACTS Devices
—Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area monitor and wide-are...
Wei Qiao, Ronald G. Harley, Ganesh K. Venayagamoor...
129
Voted
IWPSE
2007
IEEE
15 years 7 months ago
Using concept analysis to detect co-change patterns
Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
Tudor Gîrba, Stéphane Ducasse, Adrian...
COSIT
2007
Springer
114views GIS» more  COSIT 2007»
15 years 7 months ago
Spatial Information Extraction for Cognitive Mapping with a Mobile Robot
When animals (including humans) first explore a new environment, what they remember is fragmentary knowledge about the places visited. Yet, they have to use such fragmentary knowl...
Jochen Schmidt, Chee K. Wong, Wai K. Yeap
117
Voted
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 7 months ago
Self-adaptive ant colony optimisation applied to function allocation in vehicle networks
Modern vehicles possess an increasing number of software and hardware components that are integrated in electronic control units (ECUs). Finding an optimal allocation for all comp...
Manuel Förster, Bettina Bickel, Bernd Hardung...