Sciweavers

7821 search results - page 1451 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
110
Voted
BMEI
2008
IEEE
15 years 7 months ago
Performance Evaluation and Fusion of Methods for Early Detection of Alzheimer Disease
The number of people that develop Alzheimer’s Disease (AD) is rapidly rising, while the initial diagnosis and care of AD patients typically falls on non-specialist and still tak...
Brahim Hamadicharef, Cuntai Guan, Emmanuel C. Ifea...
81
Voted
ICCCN
2008
IEEE
15 years 7 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
85
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Finding Self-Similarities in Opportunistic People Networks
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic net...
Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli...
113
Voted
IROS
2007
IEEE
204views Robotics» more  IROS 2007»
15 years 7 months ago
Over-the-horizon, autonomous navigation for planetary exploration
— The success of NASA’s Mars Exploration Rovers has demonstrated the important benefits that mobility adds to planetary exploration. Very soon, mission requirements will impos...
Ioannis M. Rekleitis, Jean-Luc Bedwani, Erick Dupu...
UCS
2007
Springer
15 years 6 months ago
Discriminative Temporal Smoothing for Activity Recognition from Wearable Sensors
Abstract. This paper describes daily life activity recognition using wearable acceleration sensors attached to four different parts of the human body. The experimental data set con...
Jaakko Suutala, Susanna Pirttikangas, Juha Rö...
« Prev « First page 1451 / 1565 Last » Next »