Sciweavers

8928 search results - page 1467 / 1786
» Modeling Current Events
Sort
View
PERVASIVE
2009
Springer
15 years 11 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
CEC
2009
IEEE
15 years 11 months ago
Heterogeneous particle swarm optimizers
— Particle swarm optimization (PSO) is a swarm intelligence technique originally inspired by models of flocking and of social influence that assumed homogeneous individuals. Du...
Marco Antonio Montes de Oca, Jorge Peña, Th...
CLUSTER
2009
IEEE
15 years 11 months ago
Granules: A lightweight, streaming runtime for cloud computing with support, for Map-Reduce
— Cloud computing has gained significant traction in recent years. The Map-Reduce framework is currently the most dominant programming model in cloud computing settings. In this ...
Shrideep Pallickara, Jaliya Ekanayake, Geoffrey Fo...
CRV
2009
IEEE
217views Robotics» more  CRV 2009»
15 years 11 months ago
Probabilistic 3D Tracking: Rollator Users' Leg Pose from Coronal Images
Understanding the human gait is an important objective towards improving elderly mobility. In turn, gait analyses largely depend on kinematic and dynamic measurements. While the m...
Samantha Ng, Adel H. Fakih, Adam Fourney, Pascal P...
CSE
2009
IEEE
15 years 11 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
« Prev « First page 1467 / 1786 Last » Next »