Sciweavers

2269 search results - page 365 / 454
» Query Incentive Networks
Sort
View
110
Voted
PERVASIVE
2007
Springer
15 years 8 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
15 years 8 months ago
Web Browser Control Using EMG Based Sub Vocal Speech Recognition
—Subvocal electromyogram (EMG) signal classification is used to control a modified web browser interface. Recorded surface signals from the larynx and sublingual areas below the ...
Chuck Jorgensen, Kim Binsted
IAT
2005
IEEE
15 years 8 months ago
Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems
Similarity measures are mechanisms that assign a numeric score indicating how closely two documents, or a document and a query match. The Cosine measure is one of the similarity m...
Sepideh Miralaei, Ali A. Ghorbani
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
15 years 7 months ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
HAIS
2010
Springer
15 years 7 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...