Sciweavers

823 search results - page 142 / 165
» Location Based Access to Moving Data Sources
Sort
View
100
Voted
TCOM
2010
162views more  TCOM 2010»
14 years 4 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
ESORICS
2009
Springer
15 years 10 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
EDBT
2004
ACM
163views Database» more  EDBT 2004»
15 years 9 months ago
Energy-Conserving Air Indexes for Nearest Neighbor Search
A location-based service (LBS) provides information based on the location information specified in a query. Nearest-neighbor (NN) search is an important class of queries supported ...
Baihua Zheng, Jianliang Xu, Wang-Chien Lee, Dik Lu...
87
Voted
IWINAC
2009
Springer
15 years 2 months ago
Results of an Adaboost Approach on Alzheimer's Disease Detection on MRI
Abstract. In this paper we explore the use of the Voxel-based Morphometry (VBM) detection clusters to guide the feature extraction processes for the detection of Alzheimer's d...
Alexandre Savio, Maite García-Sebasti&aacut...
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
15 years 3 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh