Sciweavers

8468 search results - page 1432 / 1694
» The Technology of Data Stashing
Sort
View
CIKM
2009
Springer
15 years 3 months ago
Personalization as a service: the architecture and a case study
Cloud computing has become a hot topic in the IT industry. Great efforts have been made to establish cloud computing platforms for enterprise users, mostly small businesses. Howe...
Hang Guo, Jidong Chen, Wentao Wu, Wei Wang 0009
GEOS
2009
Springer
15 years 3 months ago
SPARQL Query Re-writing Using Partonomy Based Transformation Rules
Abstract. Often the information present in a spatial knowledge base is represented at a different level of granularity and abstraction than the query constraints. For querying onto...
Prateek Jain, Peter Z. Yeh, Kunal Verma, Cory A. H...
HUC
2009
Springer
15 years 3 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...
ICFCA
2009
Springer
15 years 3 months ago
A Novel Approach to Cell Formation
We present an approach to the cell formation problem, known from group technology, which is inspired by formal concept analysis. The cell formation problem consists in allocating p...
Radim Belohlávek, Niranjan Kulkarni, Vil&ea...
PCI
2009
Springer
15 years 3 months ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...
« Prev « First page 1432 / 1694 Last » Next »