Sciweavers

528 search results - page 47 / 106
» Introducing records by refactoring
Sort
View
MOBILWARE
2009
ACM
15 years 4 months ago
Map-Based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point
Sub-Nyquist sampling techniques for Wireless Sensor Networks (WSN) are gaining increasing attention as an alternative method to capture natural events with desired quality while mi...
Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Nas...
DSN
2008
IEEE
15 years 4 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
HICSS
2008
IEEE
97views Biometrics» more  HICSS 2008»
15 years 4 months ago
Temporal and Spatial Requirements for Optimized Fault Location
With technological advancements data availability in power systems is drastically increased. Intelligent electronic devices are capable of communicating recorded data. Data can be...
Mladen Kezunovic, Maja Knezev
ICPR
2008
IEEE
15 years 4 months ago
Robust indoor activity recognition via boosting
In this paper, a novel statistical indoor activity recognition algorithm is introduced. While conditional random fields (CRFs) have prominent properties to this task, no optimal ...
Masamichi Shimosaka, Taketoshi Mori, Tomomasa Sato
IEEEARES
2008
IEEE
15 years 4 months ago
A Bayesian Approach for on-Line Max Auditing
In this paper we propose a method for on-line max auditing of dynamic statistical databases. The method extends the Bayesian approach presented in [2], [3] and [4] for static data...
Gerardo Canfora, Bice Cavallo