Sciweavers

4498 search results - page 756 / 900
» The Power of Data
Sort
View
IJCAI
2007
14 years 11 months ago
WiFi-SLAM Using Gaussian Process Latent Variable Models
WiFi localization, the task of determining the physical location of a mobile device from wireless signal strengths, has been shown to be an accurate method of indoor and outdoor l...
Brian Ferris, Dieter Fox, Neil D. Lawrence
IM
2007
14 years 11 months ago
Server virtualization in autonomic management of heterogeneous workloads
—Server virtualization opens up a range of new possibilities for autonomic datacenter management, through the availability of new automation mechanisms that can be exploited to c...
Malgorzata Steinder, Ian Whalley, David Carrera, I...
MIE
2008
125views Healthcare» more  MIE 2008»
14 years 11 months ago
Knowledge Management for the Protection of Information in Electronic Medical Records
: This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for ...
Nathan Lea, Stephen Hailes, Tony Austin, Dipak Kal...
SEC
2007
14 years 11 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
AAAI
2006
14 years 11 months ago
The Keystone Scavenger Team
Stereo vision for small mobile robots is a challenging problem, particularly when employing embedded systems with limited processing power. However, it holds the promise of greatl...
Jacky Baltes, John Anderson