Sciweavers

2421 search results - page 351 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
AUTOMATICA
2010
99views more  AUTOMATICA 2010»
15 years 4 months ago
Continuous trajectory planning of mobile sensors for informative forecasting
This paper addresses planning of continuous paths for mobile sensors to reduce uncertainty in some quantities of interest in the future. The mutual information between the measure...
Han-Lim Choi, Jonathan P. How
PAMI
2007
196views more  PAMI 2007»
15 years 4 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
WWW
2005
ACM
16 years 5 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
WWW
2005
ACM
16 years 5 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
CASES
2010
ACM
15 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman