Sciweavers

8377 search results - page 1609 / 1676
» Scenarios - Introduction
Sort
View
IJDE
2007
123views more  IJDE 2007»
14 years 11 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
AAI
2005
166views more  AAI 2005»
14 years 11 months ago
Interactive Knowledge Construction in the Collaborative Building of an Encyclopedia
1 One of the major challenges of Applied Artificial Intelligence is to provide environments where high level human activities like learning, constructing theories or performing exp...
Philippe Lemoisson, Stefano A. Cerri
ADHOC
2005
119views more  ADHOC 2005»
14 years 11 months ago
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the t...
Chunyu Hu, Jennifer C. Hou
ALGORITHMICA
2005
195views more  ALGORITHMICA 2005»
14 years 11 months ago
Bit-Parallel Witnesses and Their Applications to Approximate String Matching
We present a new bit-parallel technique for approximate string matching. We build on two previous techniques. The first one, BPM [Myers, J. of the ACM, 1999], searches for a patte...
Heikki Hyyrö, Gonzalo Navarro
IJON
2007
82views more  IJON 2007»
14 years 11 months ago
Inhibitory conductance dynamics in cortical neurons during activated states
During activated states in vivo, neocortical neurons are subject to intense synaptic activity and high-amplitude membrane potential ðVmÞ fluctuations. These ‘‘high-conducta...
Martin Pospischil, Zuzanna Piwkowska, Michelle Rud...
« Prev « First page 1609 / 1676 Last » Next »