Sciweavers

914 search results - page 183 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
MM
2006
ACM
178views Multimedia» more  MM 2006»
13 years 11 months ago
Multimedia signal processing for behavioral quantification in neuroscience
While there have been great advances in quantification of the genotype of organisms, including full genomes for many species, the quantification of phenotype is at a comparatively...
Peter Andrews, Haibin Wang, Dan Valente, Jih&egrav...
PERCOM
2010
ACM
13 years 3 months ago
Towards wearable sensing-based assessment of fluid intake
—Fluid intake is an important information for many health and assisted living applications. At the same time it is inherently difficult to monitor. Existing reliable solutions r...
Oliver Amft, David Bannach, Gerald Pirkl, Matthias...
ICDE
2010
IEEE
801views Database» more  ICDE 2010»
14 years 4 months ago
The Similarity Join Database Operator
Similarity joins have been studied as key operations in multiple application domains, e.g., record linkage, data cleaning, multimedia and video applications, and phenomena detectio...
Mohamed H. Ali, Walid G. Aref, Yasin N. Silva
SEM
2004
Springer
13 years 10 months ago
Service Discovery Protocol Interoperability in the Mobile Environment
The emergence of portable computers and wireless technologies has introduced new challenges for middleware. Mobility brings new requirements and is becoming a key characteristic. M...
Yérom-David Bromberg, Valérie Issarn...