Sciweavers

378 search results - page 51 / 76
» Information Fusion in the Immune System
Sort
View
WSC
2007
15 years 4 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
LOCA
2007
Springer
15 years 8 months ago
Inferring Position Knowledge from Location Predicates
Many context- and location-aware applications request high accuracy and availability of positioning systems. In reality however, knowledge about the current position may be incompl...
Jörg Roth
FTDCS
2004
IEEE
15 years 5 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis
CHI
1995
ACM
15 years 5 months ago
Applying Electric Field Sensing to Human-Computer Interfaces
A non-contact sensor based on the interaction of a person with electric fields for human-computer interface is investigated. Two sensing modes are explored: an external electric f...
Thomas G. Zimmerman, Joshua R. Smith, Joseph A. Pa...
ALIFE
2006
15 years 2 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho