Sciweavers

10718 search results - page 2060 / 2144
» On the Circuit Implementation Problem
Sort
View
COOPIS
2004
IEEE
15 years 7 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
CP
2004
Springer
15 years 7 months ago
ID Walk: A Candidate List Strategy with a Simple Diversification Device
This paper presents a new optimization metaheuristic called ID Walk (Intensification/Diversification Walk) that offers advantages for combining simplicity with effectiveness. In ad...
Bertrand Neveu, Gilles Trombettoni, Fred Glover
CSB
2004
IEEE
152views Bioinformatics» more  CSB 2004»
15 years 7 months ago
Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework
The Gene Ontology (GO) resource can be used as a powerful tool to uncover the properties shared among, and specific to, a list of genes produced by high-throughput functional geno...
Sheng Zhong, Lu Tian, Cheng Li, Kai-Florian Storch...
ECAI
2004
Springer
15 years 7 months ago
Lakatos-Style Automated Theorem Modification
We describe a flexible approach to automated reasoning, where non-theorems can be automatically altered to produce proved results which are related to the original. This is achieve...
Simon Colton, Alison Pease
ESAS
2004
Springer
15 years 7 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
« Prev « First page 2060 / 2144 Last » Next »