Sciweavers

17409 search results - page 3354 / 3482
» The Design and Performance of MedJava
Sort
View
150
Voted
TKDE
2008
156views more  TKDE 2008»
15 years 3 months ago
A Framework for Mining Sequential Patterns from Spatio-Temporal Event Data Sets
Given a large spatio-temporal database of events, where each event consists of the fields event ID, time, location, and event type, mining spatio-temporal sequential patterns ident...
Yan Huang, Liqin Zhang, Pusheng Zhang
138
Voted
JIRS
2007
162views more  JIRS 2007»
15 years 3 months ago
Walking Control Algorithm of Biped Humanoid Robot on Uneven and Inclined Floor
This paper describes walking control algorithm for the stable walking of a biped humanoid robot on an uneven and inclined floor. Many walking control techniques have been develope...
Jung-Yup Kim, Ill-Woo Park, Jun-Ho Oh
148
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 3 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
147
Voted
JPDC
2007
117views more  JPDC 2007»
15 years 3 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
116
Voted
JPDC
2007
77views more  JPDC 2007»
15 years 3 months ago
Location-centric storage for safety warning based on roadway sensor networks
We propose a novel vision for roadway safety warning based on sensor networks, aiming at providing user-friendly zero-delay safety warnings to motorists. Our idea leverages the ad...
Kai Xing, Xiuzhen Cheng, Fang Liu, Shmuel Rotenstr...
« Prev « First page 3354 / 3482 Last » Next »