Sciweavers

10458 search results - page 1705 / 2092
» Modeling Features at Runtime
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
IJSYSC
2006
86views more  IJSYSC 2006»
15 years 4 months ago
Cooperative forest fire surveillance using a team of small unmanned air vehicles
The objective of this paper is to explore the feasibility of using multiple low-altitude, short endurance (LASE) unmanned air vehicles (UAVs) to cooperatively monitor and track th...
David W. Casbeer, Derek B. Kingston, Randal W. Bea...
155
Voted
IS
2006
15 years 4 months ago
Composition of Semantic Web services using Linear Logic theorem proving
This paper introduces a method for automatic composition of Semantic Web services using Linear Logic (LL) theorem proving. The method uses a Semantic Web service language (DAML-S)...
Jinghai Rao, Peep Küngas, Mihhail Matskin
CVGIP
2007
108views more  CVGIP 2007»
15 years 4 months ago
Physically based rigging for deformable characters
In this paper we introduce a framework for instrumenting (“rigging”) characters that are modeled as dynamic elastic bodies, so that their shapes can be controlled by an animat...
Steve Capell, Matthew Burkhart, Brian Curless, Tom...
JUCS
2008
157views more  JUCS 2008»
15 years 4 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
« Prev « First page 1705 / 2092 Last » Next »