Sciweavers

8655 search results - page 1395 / 1731
» Challenges for Trusted Computing
Sort
View
JCST
2008
203views more  JCST 2008»
15 years 3 months ago
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks
Routing is a fundamental problem in wireless sensor networks. Most previous routing protocols are challenged when used in large dynamic networks as they suffer from either poor sca...
Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong C...
129
Voted
ISI
2006
Springer
15 years 3 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
138
Voted
CSDA
2007
106views more  CSDA 2007»
15 years 3 months ago
Parsimonious additive models
A new method for function estimation and variable selection, specifically designed for additive models fitted by cubic splines is proposed.This new method involves regularizing ...
Marta Avalos, Yves Grandvalet, Christophe Ambroise
148
Voted
CVIU
2007
121views more  CVIU 2007»
15 years 3 months ago
Vision-based hand pose estimation: A review
Direct use of the hand as an input device is an attractive method for providing natural human–computer interaction (HCI). Currently, the only technology that satisfies the adva...
Ali Erol, George Bebis, Mircea Nicolescu, Richard ...
133
Voted
DAM
2007
91views more  DAM 2007»
15 years 3 months ago
Integer linear programming approaches for non-unique probe selection
In addition to their prevalent use for analyzing gene expression, DNA microarrays are an efficient tool for biological, medical, and industrial applications because of their abil...
Gunnar W. Klau, Sven Rahmann, Alexander Schliep, M...
« Prev « First page 1395 / 1731 Last » Next »