Sciweavers

8479 search results - page 1370 / 1696
» Data Extraction from Web Data Sources
Sort
View
DSN
2008
IEEE
15 years 11 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
ICASSP
2008
IEEE
15 years 11 months ago
Compressive wireless arrays for bearing estimation
Joint processing of sensor array outputs improves the performance of parameter estimation and hypothesis testing problems beyond the sum of the individual sensor processing result...
Volkan Cevher, Ali Cafer Gurbuz, James H. McClella...
178
Voted
ICMB
2007
IEEE
157views Business» more  ICMB 2007»
15 years 11 months ago
Estimating the Capacity of the Location - Based Advertising Channel
Delivering “relevant” advertisements to consumers carrying mobile devices is regarded by many as one of the most promising mobile business opportunities. The relevance of a mo...
Gyözö Gidófalvi, Hans Ravnkj&aeli...
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
IPPS
2007
IEEE
15 years 11 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
« Prev « First page 1370 / 1696 Last » Next »