Sciweavers

14897 search results - page 2780 / 2980
» Environment for statistical computing
Sort
View
177
Voted
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 10 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
152
Voted
JDCTA
2010
164views more  JDCTA 2010»
14 years 10 months ago
Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing
With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There ...
Lu Lu, Xiuxia Quan
90
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Ignition Coil Insulation Fault Detection Algorithm
Pulse singularities with variable amplitudes appear in the corresponding positions of ignition coil primary current waveform when insulation fault occurs during the ignition proce...
Mutian Li, Yongping Zhao, Qisong Wang
144
Voted
JDCTA
2010
148views more  JDCTA 2010»
14 years 10 months ago
Web Services Supervision System Based on Jade
Web service technology is one of the trend technologies in computer science now, and recently with the rapid growth of web services deployed with the same functionality, many rese...
Ahmed Sallam, Zhiyong Li, Shaimaa Hassan
184
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
« Prev « First page 2780 / 2980 Last » Next »