Sciweavers

4511 search results - page 777 / 903
» Observation Based System Security
Sort
View
82
Voted
ICC
2009
IEEE
140views Communications» more  ICC 2009»
15 years 4 months ago
Joint Scheduling and Relay Selection in One- and Two-Way Relay Networks with Buffering
— In most wireless relay networks, the source and relay nodes transmit successively via fixed time division (FTD) and each relay forwards a packet immediately upon receiving. In...
Lianghui Ding, Meixia Tao, Fan Yang, Wenjun Zhang
IROS
2009
IEEE
145views Robotics» more  IROS 2009»
15 years 4 months ago
KNOWROB - knowledge processing for autonomous personal robots
— Knowledge processing is an essential technique for enabling autonomous robots to do the right thing to the right object in the right way. Using knowledge processing the robots ...
Moritz Tenorth, Michael Beetz
IWPC
2009
IEEE
15 years 4 months ago
Crosscutting patterns and design stability: An exploratory analysis
It is often claimed that inaccurate modularisation of crosscutting concerns hinders program comprehension and, as a consequence, leads to harmful software instabilities. However, ...
Eduardo Figueiredo, Bruno Carreiro da Silva, Cl&aa...
CSEE
2009
Springer
15 years 4 months ago
Software Engineering Education for Bioinformatics
As software engineering educators, it is important for us to realize the increasing domainspecificity of software, and incorporate these changes in our design of teaching material...
Medha Umarji, Carolyn B. Seaman, Akif Günes K...
ISMIS
2009
Springer
15 years 4 months ago
Relational Sequence Clustering for Aggregating Similar Agents
Many clustering methods are based on flat descriptions, while data regarding real-world domains include heterogeneous objects related to each other in multiple ways. For instance,...
Grazia Bombini, Nicola Di Mauro, Stefano Ferilli, ...