Sciweavers

9697 search results - page 1935 / 1940
» Intelligent Transportation Systems
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
JAPLL
2010
98views more  JAPLL 2010»
14 years 8 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton
JSAC
2010
138views more  JSAC 2010»
14 years 8 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
83
Voted
JUCS
2010
164views more  JUCS 2010»
14 years 8 months ago
On Sustainability of Context-Aware Services Among Heterogeneous Smart Spaces
Abstract: Most of ambient intelligence studies have tried to employ inductive methods (e.g., data mining) to discover useful information and patterns from data streams on sensor ne...
Jason J. Jung
KES
2010
Springer
14 years 8 months ago
SceneMaker: Multimodal Visualisation of Natural Language Film Scripts
Abstract. Producing plays, films or animations is a complex and expensive process involving various professionals and media. Our proposed software system, SceneMaker, aims to faci...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...
« Prev « First page 1935 / 1940 Last » Next »