This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
Wide area ocean networks for monitoring and scientific exploratory purposes are in various stages of design; smallscale networks are already in various stages of deployment and te...
Sumit Roy, Payman Arabshahi, Dan Rouseff, Warren L...
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but difficult problem. Thi...
Monitoring human motion has recently received great attention and can be used in many applications, such as human motion prediction. We present the collected data set from a body ...
Jefrey Lijffijt, Panagiotis Papapetrou, Jaakko Hol...
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...