Sciweavers

1897 search results - page 280 / 380
» Sparse Additive Machine
Sort
View
111
Voted
CSMR
2007
IEEE
15 years 7 months ago
Consistently Incorporating Changes to Evolve Transition-based Systems
Evolving software-intensive systems from one consistent state to another is a challenging activity due to the intricate inter-dependencies among the components. In this paper, we ...
Mahadevan Subramaniam, Harvey P. Siy
81
Voted
FCCM
2007
IEEE
134views VLSI» more  FCCM 2007»
15 years 7 months ago
FPGA-accelerated seed generation in Mercury BLASTP
BLASTP is the most popular tool to perform comparative sequence analysis of protein sequences. An exponential increase in the size of protein sequence databases in recent years, h...
Arpith C. Jacob, Joseph M. Lancaster, Jeremy Buhle...
79
Voted
ICRA
2007
IEEE
147views Robotics» more  ICRA 2007»
15 years 7 months ago
Classification-Based Wheel Slip Detection and Detector Fusion for Outdoor Mobile Robots
— This paper introduces a signal-recognition based approach for detecting autonomous mobile robot immobilization on outdoor terrain. The technique utilizes a support vector machi...
Chris C. Ward, Karl Iagnemma
120
Voted
SECON
2007
IEEE
15 years 7 months ago
High-Level Application Development is Realistic for Wireless Sensor Networks
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
Marcin Karpinski, Vinny Cahill
103
Voted
SECURWARE
2007
IEEE
15 years 7 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate