Sciweavers

8118 search results - page 1610 / 1624
» The Newton Application Architecture
Sort
View
JCP
2006
157views more  JCP 2006»
14 years 9 months ago
An Infrastructure for Service Oriented Sensor Networks
Emerging wireless technologies enable ubiquitous access to networked services. Integration of wireless technologies into sensor and actuator nodes provides the means for remote acc...
Åke Östmark, Jens Eliasson, Per Lindgre...
PERCOM
2008
ACM
14 years 9 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
PR
2008
124views more  PR 2008»
14 years 9 months ago
A daily behavior enabled hidden Markov model for human behavior understanding
This paper presents a Hierarchical Context Hidden Markov Model (HC-HMM) for behavior understanding from video streams in a nursing center. The proposed HC-HMM infers elderly behav...
Pau-Choo Chung, Chin-De Liu
SIGARCH
2008
96views more  SIGARCH 2008»
14 years 9 months ago
Towards hybrid last level caches for chip-multiprocessors
As CMP platforms are widely adopted, more and more cores are integrated on to the die. To reduce the off-chip memory access, the last level cache is usually organized as a distribu...
Li Zhao, Ravi Iyer, Mike Upton, Don Newell
SAC
2006
ACM
14 years 9 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
« Prev « First page 1610 / 1624 Last » Next »