Sciweavers

8655 search results - page 1328 / 1731
» Challenges for Trusted Computing
Sort
View
HIPC
2005
Springer
15 years 9 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
IBPRIA
2005
Springer
15 years 9 months ago
Robust Person-Independent Visual Sign Language Recognition
Sign language recognition constitutes a challenging field of research in computer vision. Common problems like overlap, ambiguities, and minimal pairs occur frequently and require...
Jörg Zieren, Karl-Friedrich Kraiss
ICCS
2005
Springer
15 years 9 months ago
eMicrob: A Grid-Based Spatial Epidemiology Application
The use of Grid technologies allows us to make progress in the prediction accuracy of epidemiological patterns, epidemiological modeling, risk predictions of infectious diseases et...
Jianping Guo, Yong Xue, Chunxiang Cao, Wuchun Cao,...
ICIC
2005
Springer
15 years 9 months ago
Sequential Stratified Sampling Belief Propagation for Multiple Targets Tracking
Rather than the difficulties of highly non-linear and non-Gaussian observation process and the state distribution in single target tracking, the presence of a large, varying number...
Jianru Xue, Nanning Zheng, Xiaopin Zhong
ICN
2005
Springer
15 years 9 months ago
Two Energy-Efficient Routing Algorithms for Wireless Sensor Networks
: Power Conservation is one of the most important challenges in wireless sensor networks. In this paper, we present two minimum-energy routing algorithms. Our main goal is to reduc...
Hung Le Xuan, Youngku Lee, Sungyoung Lee
« Prev « First page 1328 / 1731 Last » Next »