Sciweavers

12183 search results - page 2368 / 2437
» Computers under Attacks!
Sort
View
DAGSTUHL
2007
14 years 11 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...
LREC
2010
180views Education» more  LREC 2010»
14 years 11 months ago
Collecting Voices from the Cloud
The collection and transcription of speech data is typically an expensive and time-consuming task. Voice over IP and cloud computing are poised to greatly reduce this impediment t...
Ian McGraw, Chia-ying Lee, I. Lee Hetherington, St...
DICTA
2008
14 years 11 months ago
Image Reconstruction from Contrast Information
An iterative algorithm for the reconstruction of natural images given only their contrast map is presented. The solution is neuro-physiologically inspired, where the retinal cells...
Asim A. Khwaja, Roland Goecke
MASCOTS
2010
14 years 11 months ago
EntomoModel: Understanding and Avoiding Performance Anomaly Manifestations
Subtle implementation errors or mis-configurations in complex Internet services may lead to performance degradations without causing failures. These undiscovered performance anomal...
Christopher Stewart, Kai Shen, Arun Iyengar, Jian ...
EDM
2008
127views Data Mining» more  EDM 2008»
14 years 11 months ago
Adaptive Test Design with a Naive Bayes Framework
Bayesian graphical models are commonly used to build student models from data. A number of standard algorithms are available to train Bayesian models from student skills assessment...
Michel C. Desmarais, Alejandro Villarreal, Michel ...
« Prev « First page 2368 / 2437 Last » Next »