Sciweavers

1733 search results - page 327 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
IPCCC
2006
IEEE
15 years 3 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
14 years 10 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
COBUILD
1999
Springer
15 years 1 months ago
Bringing the Marks on a Whiteboard to Electronic Life
This paper discusses our implementation and experience with a camera-based whiteboard scanner. The ZombieBoard system (so called because it brings to electronic life the marks on a...
Eric Saund
MHCI
2009
Springer
15 years 4 months ago
Using an ecological framework to design mobile technologies for pediatric asthma management
Mobile technologies, due to their ubiquitous nature, play an important role in supporting health care. However, it is not easy to design useful integrated mobile services without ...
Hee Young Jeong, Rosa I. Arriaga
3DGIS
2006
Springer
15 years 3 months ago
3D Geometries in Spatial DBMS
Database management systems (DBMS) have significantly changed in the last several years. From a system dealing with management of administrative data they have involved to a spati...
Sisi Zlatanova