Sciweavers

5615 search results - page 1018 / 1123
» On the Computational Capabilities of Several Models
Sort
View
HIPC
2005
Springer
15 years 3 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
ISVC
2005
Springer
15 years 3 months ago
Retinal Image Registration for NIH's ETDRS
This paper presents a retinal image registration approach for National Institute of Health (NIH)’s Early Treatment Diabetic Retinopathy Study (ETDRS) standard. The ETDRS imaging ...
Thitiporn Chanwimaluang, Guoliang Fan
PCI
2005
Springer
15 years 3 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
UIST
2004
ACM
15 years 3 months ago
Topiary: a tool for prototyping location-enhanced applications
Location-enhanced applications use the location of people, places, and things to augment or streamline interaction. Location-enhanced applications are just starting to emerge in s...
Yang Li, Jason I. Hong, James A. Landay
IPTPS
2004
Springer
15 years 3 months ago
Uncoordinated Load Balancing and Congestion Games in P2P Systems
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
Subhash Suri, Csaba D. Tóth, Yunhong Zhou
« Prev « First page 1018 / 1123 Last » Next »