Sciweavers

6431 search results - page 1004 / 1287
» Model Building by Resolution
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
JUCS
2008
157views more  JUCS 2008»
15 years 4 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
JETAI
2006
63views more  JETAI 2006»
15 years 4 months ago
Principled exploitation of behavioural coupling
In robot building, attention tends to focus on internal signal processing and the way desired motor signals are generated. But equally important is the selection and configuration...
Chris Thornton
JMLR
2006
117views more  JMLR 2006»
15 years 4 months ago
On the Complexity of Learning Lexicographic Strategies
Fast and frugal heuristics are well studied models of bounded rationality. Psychological research has proposed the take-the-best heuristic as a successful strategy in decision mak...
Michael Schmitt, Laura Martignon
JODS
2006
148views Data Mining» more  JODS 2006»
15 years 4 months ago
Discovering the Semantics of Relational Tables Through Mappings
Abstract. Many problems in Information and Data Management require a semantic account of a database schema. At its best, such an account consists of formulas expressing the relatio...
Yuan An, Alexander Borgida, John Mylopoulos
« Prev « First page 1004 / 1287 Last » Next »