Sciweavers

274 search results - page 33 / 55
» Planning Operation: An Extensio'n of a Geographical Informat...
Sort
View
IJSN
2008
145views more  IJSN 2008»
14 years 11 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
15 years 24 days ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
MM
2006
ACM
138views Multimedia» more  MM 2006»
15 years 5 months ago
VirtualTour: an online travel assistant based on high quality images
With the popularity of both travel and Web, more and more people use online travel services to facilitate their travel activities or share their travel experiences. Considering th...
Feng Jing, Lei Zhang, Wei-Ying Ma
ALIFE
1999
14 years 11 months ago
An Approach to Biological Computation: Unicellular Core-Memory Creatures Evolved Using Genetic Algorithms
A novel machine language genetic programming system that uses one-dimensional core memories is proposed and simulated. The core is compared to a biochemical reaction space, and in ...
Hikeaki Suzuki
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 6 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter