Sciweavers

3887 search results - page 601 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
ISWC
1997
IEEE
15 years 7 months ago
Towards Situated Computing
Situated computing concerns the ability of computing devices to detect, interpret and respond to aspects of the user’s local environment. In this paper, we use our recent protot...
Richard Hull 0002, Philip Neaves, James Bedford-Ro...
BMCBI
2007
103views more  BMCBI 2007»
15 years 3 months ago
Dynamic simulation of regulatory networks using SQUAD
Background: The ambition of most molecular biologists is the understanding of the intricate network of molecular interactions that control biological systems. As scientists uncove...
Alessandro Di Cara, Abhishek Garg, Giovanni De Mic...
MOBIDE
2006
ACM
15 years 9 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
117
Voted
ICOST
2007
Springer
15 years 9 months ago
Distributed Vision-Based Accident Management for Assisted Living
We consider the problem of assisting vulnerable people and their carers to reduce the occurrence, and concomitant consequences, of accidents in the home. A wireless sensor network ...
Hamid K. Aghajan, Juan Carlos Augusto, Chen Wu, Pa...
RAID
2000
Springer
15 years 6 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner