Sciweavers

979 search results - page 132 / 196
» Event Detection in Pedestrian Detection and Tracking Applica...
Sort
View
IJSNET
2006
129views more  IJSNET 2006»
14 years 9 months ago
Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks
Recently, wireless sensor networks have been widely discussed in many applications. In this paper, we propose a novel 3D emergency service that aims to guide people to safe places...
Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng
ICSE
1998
IEEE-ACM
15 years 1 months ago
An Approach to Large-Scale Collection of Application Usage Data Over the Internet
Empirical evaluation of software systems in actual usage situations is critical in software engineering. Prototyping, beta testing, and usability testing are widely used to refine...
David M. Hilbert, David F. Redmiles
EUROSYS
2009
ACM
15 years 6 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
15 years 11 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...