Sciweavers

1635 search results - page 291 / 327
» Reasoning from Data Rather than Theory
Sort
View
86
Voted
SENSYS
2003
ACM
15 years 4 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan

Publication
322views
15 years 3 months ago
Three-dimensional point cloud recognition via distributions of geometric distances
Ageometric framework for the recognition of three-dimensional objects represented by point clouds is introducedin this paper. The proposed approach is based on comparing distribut...
Mona Mahmoudi, Guillermo Sapiro
DIS
2001
Springer
15 years 3 months ago
Computational Discovery of Communicable Knowledge: Symposium Report
Abstract. The Symposium on Computational Discovery of Communicable Knowledge was held from March 24 to 25, 2001, at Stanford University. Fifteen speakers reviewed recent advances i...
Saso Dzeroski, Pat Langley
WISEC
2010
ACM
14 years 11 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
91
Voted
ARTMED
2008
109views more  ARTMED 2008»
14 years 11 months ago
MOPET: A context-aware and user-adaptive wearable system for fitness training
Objective: Cardiovascular disease, obesity, and lack of physical fitness are increasingly common and negatively affect people's health, requiring medical assistance and decre...
Fabio Buttussi, Luca Chittaro