Sciweavers

7075 search results - page 1232 / 1415
» Models and heterogeneous reasoning
Sort
View
86
Voted
CCS
2009
ACM
15 years 8 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
104
Voted
GIS
2009
ACM
15 years 8 months ago
Tree detection from aerial imagery
We propose an automatic approach to tree detection from aerial imagery. First a pixel-level classifier is trained to assign a {tree, non-tree} label to each pixel in an aerial im...
Lin Yang, Xiaqing Wu, Emil Praun, Xiaoxu Ma
LATA
2009
Springer
15 years 8 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig
IAT
2009
IEEE
15 years 8 months ago
Simulating BDI-Based Wireless Sensor Networks
—“Autonomic systems” merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing...
Alexis Morris, Paolo Giorgini, Sameh Abdel-Naby
92
Voted
ICDM
2009
IEEE
122views Data Mining» more  ICDM 2009»
15 years 8 months ago
Detecting and Interpreting Variable Interactions in Observational Ornithology Data
In this paper we demonstrate a practical approach to interaction detection on real data describing the abundance of different species of birds in the prairies east of the souther...
Daria Sorokina, Rich Caruana, Mirek Riedewald, Wes...
« Prev « First page 1232 / 1415 Last » Next »