Sciweavers

10577 search results - page 2014 / 2116
» Active Data Mining
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
SUM
2010
Springer
14 years 8 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
BMCBI
2011
14 years 5 months ago
Systematic error detection in experimental high-throughput screening
Background: High-throughput screening (HTS) is a key part of the drug discovery process during which thousands of chemical compounds are screened and their activity levels measure...
Plamen Dragiev, Robert Nadon, Vladimir Makarenkov
CCR
2011
14 years 5 months ago
Measured impact of crooked traceroute
Data collected using traceroute-based algorithms underpins research into the Internet’s router-level topology, though it is possible to infer false links from this data. One sou...
Matthew J. Luckie, Amogh Dhamdhere, kc claffy, Dav...
JDCTA
2010
347views more  JDCTA 2010»
14 years 4 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
« Prev « First page 2014 / 2116 Last » Next »