Sciweavers

12289 search results - page 2315 / 2458
» computing 2006
Sort
View
ATAL
2006
Springer
15 years 5 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
115
Voted
AAAI
2006
15 years 4 months ago
Tensor Embedding Methods
Over the past few years, some embedding methods have been proposed for feature extraction and dimensionality reduction in various machine learning and pattern classification tasks...
Guang Dai, Dit-Yan Yeung
AAAI
2006
15 years 4 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
BIOCOMP
2006
15 years 4 months ago
Surgeon's Magic Wand: A Screen Pointing Interactive Method
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...
Naren Vira, Shaleen Vira
127
Voted
DAGSTUHL
2006
15 years 4 months ago
Modeling and Simulating Biological Processes with Stochastic Multiset Rewriting
ed Abstract Membrane systems are models of computation inspired by the structure and the function of biological cells. The model was introduced in 1998 by Gh. Paun and since then m...
Matteo Cavaliere, Sean Sedwards
« Prev « First page 2315 / 2458 Last » Next »