We present an indoor wireless localization system that is capable of room-level localization based solely on 802.11 network signal strengths and usersupplied training data. Our sys...
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...
Data items archived in data warehouses or those that arrive online as streams typically have attributes which take values from multiple hierarchies (e.g., time and geographic loca...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Background: Integrating data from multiple global assays and curated databases is essential to understand the spatiotemporal interactions within cells. Different experiments measu...
Yuji Zhang, Jianhua Xuan, Benildo de los Reyes, Ro...