Sciweavers

1192 search results - page 153 / 239
» Computing Weakest Readings
Sort
View
HUC
2007
Springer
15 years 10 months ago
A Long-Term Evaluation of Sensing Modalities for Activity Recognition
We study activity recognition using 104 hours of annotated data collected from a person living in an instrumented home. The home contained over 900 sensor inputs, including wired r...
Beth Logan, Jennifer Healey, Matthai Philipose, Em...
137
Voted
UCS
2007
Springer
15 years 10 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
133
Voted
HPDC
2006
IEEE
15 years 9 months ago
Improving I/O Performance of Clustered Storage Systems by Adaptive Request Distribution
We develop an adaptive load distribution protocol for logical volume I/O workload in clustered storage systems. It exploits data redundancy among decentralized storage servers to ...
Changxun Wu, Randal C. Burns
140
Voted
ICDCS
2006
IEEE
15 years 9 months ago
Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor Networks
Wireless sensor networks have stringent constraints on system resources and data aggregation techniques are critically important. However, accurate data aggregation is difficult ...
Hongbo Jiang, Shudong Jin
ICPP
2006
IEEE
15 years 9 months ago
Address-Value Decoupling for Early Register Deallocation
We propose a series of aggressive register deallocation mechanisms to reduce the register file pressure and increase the parallelism exploited by superscalar microprocessors. Our ...
Deniz Balkan, Joseph J. Sharkey, Dmitry Ponomarev,...