Sciweavers

6147 search results - page 1197 / 1230
» Requirements, Architectures and Risks
Sort
View
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
15 years 1 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...
BALT
2008
15 years 1 months ago
Flexible Database Platform for Biomedical Research with Multiple User Interfaces and a Universal Query Engine
Biomedical research on human subjects often requires a large amount of data to be collected by personal interviews, Internet based questionnaires, lab measurements or by extracting...
Margus Jäger, Liina Kamm, Darja Krushevskaja,...
CCS
2008
ACM
15 years 1 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
IWCMC
2010
ACM
15 years 1 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
CASES
2005
ACM
15 years 1 months ago
Exploring the design space of LUT-based transparent accelerators
Instruction set customization accelerates the performance of applications by compressing the length of critical dependence paths and reducing the demands on processor resources. W...
Sami Yehia, Nathan Clark, Scott A. Mahlke, Kriszti...
« Prev « First page 1197 / 1230 Last » Next »