Sciweavers

5372 search results - page 1040 / 1075
» Robotics and interactive simulation
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
WABI
2009
Springer
155views Bioinformatics» more  WABI 2009»
15 years 8 months ago
A Markov Classification Model for Metabolic Pathways
Background: This paper considers the problem of identifying pathways through metabolic networks that relate to a specific biological response. Our proposed model, HME3M, first ide...
Timothy Hancock, Hiroshi Mamitsuka
CIARP
2009
Springer
15 years 8 months ago
Analysis of the GRNs Inference by Using Tsallis Entropy and a Feature Selection Approach
Abstract. An important problem in the bioinformatics field is to understand how genes are regulated and interact through gene networks. This knowledge can be helpful for many appl...
Fabrício Martins Lopes, Evaldo A. de Olivei...
FDG
2009
ACM
15 years 8 months ago
Robust resource allocation in a massive multiplayer online gaming environment
The environment considered in this research is a massive multiplayer online gaming (MMOG) environment. Each user controls an avatar (an image that represents and is manipulated by...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
MOBICOM
2009
ACM
15 years 8 months ago
Revenue maximization and distributed power allocation in cognitive radio networks
Cognitive radio is an enabling technology that allows unlicensed users to opportunistically access the spectrum in order to enhance the spectrum efficiency. In this paper, we cons...
Shaolei Ren, Mihaela van der Schaar
« Prev « First page 1040 / 1075 Last » Next »