Sciweavers

1131 search results - page 130 / 227
» Making Sense of Twitter
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 10 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 10 months ago
Scalable Local Area Service Discovery
— Existing methods for local area service discovery either don’t scale or rely on a trustworthy directory server; in some environments these restrictions are unacceptable or im...
Richard Black, Heimir Sverrisson, Laurent Massouli...
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
15 years 10 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
ICMCS
2007
IEEE
132views Multimedia» more  ICMCS 2007»
15 years 10 months ago
A Scheme for Haptic Data Transmission Under Various Network Conditions
Haptic Collaboration Virtual Environment (HCVE) is an enhanced virtual reality space that supports sense of touch, which is called “haptic”. In HCVE, remote users connected ov...
Yonghee You, Mee Young Sung, Kyungkoo Jun
ICRA
2007
IEEE
114views Robotics» more  ICRA 2007»
15 years 10 months ago
A Short Paper about Motion Safety
— Motion safety for robotic systems operating in the real world is critical (especially when their size and dynamics make them potentially harmful for themselves or their environ...
Thierry Fraichard