Sciweavers

8636 search results - page 1412 / 1728
» How Developers Copy
Sort
View
JCP
2008
131views more  JCP 2008»
15 years 4 months ago
Multi-Index Cooperative Mixed Strategy for Service Selection Problem in Service-Oriented Architecture
Under the environment of Service-Oriented Architecture (SOA), service users have to decide how to choose the proper provider from the candidates to obtain optimal service level. Th...
Yimin Shen, Jing Zhang, Yushun Fan
JCS
2008
88views more  JCS 2008»
15 years 4 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CORR
2007
Springer
140views Education» more  CORR 2007»
15 years 4 months ago
From the entropy to the statistical structure of spike trains
— We use statistical estimates of the entropy rate of spike train data in order to make inferences about the underlying structure of the spike train itself. We first examine a n...
Yun Gao, Ioannis Kontoyiannis, Elie Bienenstock
JFR
2008
87views more  JFR 2008»
15 years 4 months ago
Robust vision-based underwater homing using self-similar landmarks
Next generation Autonomous Underwater Vehicles (AUVs) will be required to robustly identify underwater targets for tasks such as inspection, localization and docking. Given their ...
Amaury Nègre, Cédric Pradalier, Matt...
ISI
2006
Springer
15 years 4 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
« Prev « First page 1412 / 1728 Last » Next »