Sciweavers

835 search results - page 86 / 167
» An algorithmic approach to event summarization
Sort
View
ESWA
2006
243views more  ESWA 2006»
14 years 9 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
SENSYS
2010
ACM
14 years 7 months ago
Efficient diagnostic tracing for wireless sensor networks
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...
INFOCOM
2009
IEEE
15 years 4 months ago
Assessing the Vulnerability of the Fiber Infrastructure to Disasters
—Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such r...
Sebastian Neumayer, Gil Zussman, Reuven Cohen, Eyt...
JFR
2006
109views more  JFR 2006»
14 years 9 months ago
Alice: An information-rich autonomous vehicle for high-speed desert navigation
This paper describes the implementation and testing of Alice, the California Institute of Technology's entry in the 2005 DARPA Grand Challenge. Alice utilizes a highly networ...
Lars B. Cremean, Tully B. Foote, Jeremy H. Gillula...
ICPR
2004
IEEE
15 years 11 months ago
Dining Activity Analysis Using a Hidden Markov Model
We describe an algorithm for dining activity analysis in a nursing home. Based on several features, including motion vectors and distance between moving regions in the subspace of...
Alexander G. Hauptmann, Ashok Bharucha, Howard D. ...