Sciweavers

3771 search results - page 578 / 755
» Process modeling for future technologies
Sort
View
AGI
2008
15 years 5 months ago
The Basic AI Drives
One might imagine that AI systems with harmless goals will be harmless. This paper instead shows that intelligent systems will need to be carefully designed to prevent them from be...
Stephen M. Omohundro
BMCBI
2007
265views more  BMCBI 2007»
15 years 4 months ago
Large scale clustering of protein sequences with FORCE -A layout based heuristic for weighted cluster editing
Background: Detecting groups of functionally related proteins from their amino acid sequence alone has been a long-standing challenge in computational genome research. Several clu...
Tobias Wittkop, Jan Baumbach, Francisco P. Lobo, S...
JUCS
2006
117views more  JUCS 2006»
15 years 4 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
15 years 4 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
INFSOF
2007
116views more  INFSOF 2007»
15 years 4 months ago
An analysis of the most cited articles in software engineering journals - 2000
Citations and related work are crucial in any research to position the work and to build on the work of others. A high citation count is an indication of the influence of speciï¬...
Claes Wohlin