Sciweavers

11345 search results - page 1978 / 2269
» Foundations of Computer Science
Sort
View
ICDS
2010
IEEE
15 years 10 months ago
Body Sensor Networks for Mobile Health Monitoring: Experience in Europe and Australia
—Remote ambulatory monitoring is widely seen as playing a key part in addressing the impending crisis in health care provision. We describe two mobile health solutions, one devel...
Val Jones, Valérie Gay, Peter Leijdekkers
160
Voted
ICDS
2010
IEEE
15 years 10 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
127
Voted
HYBRID
2010
Springer
15 years 10 months ago
On a control algorithm for time-varying processor availability
We consider an anytime control algorithm for the situation when the processor resource availability is time-varying. The basic idea is to calculate the components of the control i...
Vijay Gupta
LATIN
2010
Springer
15 years 10 months ago
Modelling the LLL Algorithm by Sandpiles
Abstract The LLL algorithm aims at finding a “reduced” basis of a Euclidean lattice. The LLL algorithm plays a primary role in many areas of mathematics and computer science. ...
Manfred Madritsch, Brigitte Vallée
117
Voted
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 10 months ago
Designing an Intelligent Agent that Negotiates Tactfully with Human Counterparts: A Conceptual Analysis and Modeling Framework
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...
Yinping Yang, Sharad Singhal
« Prev « First page 1978 / 2269 Last » Next »