Sciweavers

14331 search results - page 2852 / 2867
» On the modeling and analysis of obligations
Sort
View
DSP
2008
14 years 10 months ago
On statistical approaches to target silhouette classification in difficult conditions
In this paper we present a methodical evaluation of the performance of a new and two traditional approaches to automatic target recognition (ATR) based on silhouette representatio...
Conrad Sanderson, Danny Gibbins, Stephen Searle
GIS
2010
ACM
14 years 10 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
IJBRA
2010
121views more  IJBRA 2010»
14 years 10 months ago
Mining Cytochrome b561 proteins from plant genomes
—Cytochrome b561 (Cyt-b561) proteins play important functions in plants such as anti-toxin defense reactions, growth and development, and prevention of damage to plants from exce...
Stephen O. Opiyo, Etsuko N. Moriyama
INFOCOM
2010
IEEE
14 years 10 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
JCS
2010
135views more  JCS 2010»
14 years 10 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
« Prev « First page 2852 / 2867 Last » Next »