Sciweavers

1192 search results - page 171 / 239
» Computing Weakest Readings
Sort
View
130
Voted
ICALT
2007
IEEE
15 years 10 months ago
Bayesian Modelling of Confusability of Phoneme-Grapheme Connections
Deficiencies in the ability to map letters to sounds are currently considered to be the most likely early signs of dyslexia [4]. This has motivated the use of Literate, a compute...
Mikko Vilenius, Janne V. Kujala, Ulla Richardson, ...
ICRA
2007
IEEE
165views Robotics» more  ICRA 2007»
15 years 10 months ago
Adaptive Sampling for Estimating a Scalar Field using a Robotic Boat and a Sensor Network
Abstract— This paper introduces an adaptive sampling algorithm for a mobile sensor network to estimate a scalar field. The sensor network consists of static nodes and one mobile...
Bin Zhang, Gaurav S. Sukhatme
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
145
Voted
RTCSA
2007
IEEE
15 years 10 months ago
A NOR Emulation Strategy over NAND Flash Memory
This work is motivated by a strong market demand in the replacement of NOR flash memory with NAND flash memory to cut down the cost in many embedded-system designs, such as mobi...
Jian-Hong Lin, Yuan-Hao Chang, Jen-Wei Hsieh, Tei-...
SECON
2007
IEEE
15 years 10 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao