Sciweavers

6796 search results - page 943 / 1360
» Java for Embedded Systems
Sort
View
MEDIAFORENSICS
2010
15 years 6 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
147
Voted
WSC
2001
15 years 6 months ago
Simulating networks of wireless sensors
Recent advances in low-power embedded processors, radios, and micro-mechanical systems (MEMs) have made possible the development of networks of wirelessly interconnected sensors. ...
Sung Park, Andreas Savvides, Mani B. Srivastava
162
Voted
COMAD
2009
15 years 6 months ago
Modeling Relational Data as Graphs for Mining
The focus of this paper is to develop algorithms and a framework for modeling transactional data stored in relational database into graphs for mining. Most of the real-world trans...
Subhesh Pradhan, Sharma Chakravarthy, Aditya Telan...
TEI
2010
ACM
129views Hardware» more  TEI 2010»
15 years 5 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
NN
2006
Springer
101views Neural Networks» more  NN 2006»
15 years 5 months ago
A robot model of the basal ganglia: Behavior and intrinsic processing
The existence of multiple parallel loops connecting sensorimotor systems to the basal ganglia has given rise to proposals that these nuclei serve as a selection mechanism resolvin...
Tony J. Prescott, Fernando M. Montes Gonzál...