Sciweavers

18 search results - page 3 / 4
» Using the Cloud to Determine Key Strengths
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 22 days ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
VTC
2006
IEEE
160views Communications» more  VTC 2006»
13 years 11 months ago
On the Accuracy Improvement Issues in GSM Location Fingerprinting
– Determining the position of mobile users in GSM networks has become more and more important. Such services as emergency calls and other location dependent services have been of...
Claude Mbusa Takenga, Quan Wen, Kyandoghere Kyamak...
SIAMAM
2011
13 years 22 days ago
Modeling and Design Optimization of a Resonant Optothermoacoustic Trace Gas Sensor
Trace gas sensors that are compact and portable are being deployed for use in a variety of applications including disease diagnosis via breath analysis, monitoring of atmospheric p...
Noemi Petra, John Zweck, Susan E. Minkoff, Anatoli...
MHCI
2004
Springer
13 years 11 months ago
Interactive Positioning Based on Object Visibility
Abstract. In this paper we describe a new method and user interface for interactive positioning of a mobile device. The key element of this method is a questionanswer style dialogu...
Christian Kray, Gerd Kortuem
KDD
2002
ACM
106views Data Mining» more  KDD 2002»
14 years 6 months ago
Selecting the right interestingness measure for association patterns
Many techniques for association rule mining and feature selection require a suitable metric to capture the dependencies among variables in a data set. For example, metrics such as...
Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava