Sciweavers

1050 search results - page 99 / 210
» Two methods of authenticated positioning
Sort
View
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 12 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
SENSYS
2010
ACM
14 years 12 months ago
Revealing the hidden lives of underground animals using magneto-inductive tracking
Currently, there is no existing method for automatically tracking the location of burrowing animals when they are underground, consequently zoologists only have a partial view of ...
Andrew Markham, Niki Trigoni, Stephen A. Ellwood, ...
PVLDB
2010
135views more  PVLDB 2010»
14 years 8 months ago
Efficient Skyline Evaluation over Partially Ordered Domains
Although there has been a considerable body of work on skyline evaluation in multidimensional data with totally ordered attribute domains, there are only a few methods that consid...
Shiming Zhang, Nikos Mamoulis, Ben Kao, David Wai-...
BMCBI
2008
98views more  BMCBI 2008»
15 years 2 months ago
PredGPI: a GPI-anchor predictor
Background: Several eukaryotic proteins associated to the extracellular leaflet of the plasma membrane carry a Glycosylphosphatidylinositol (GPI) anchor, which is linked to the C-...
Andrea Pierleoni, Pier Luigi Martelli, Rita Casadi...
ROBOCUP
2009
Springer
128views Robotics» more  ROBOCUP 2009»
15 years 8 months ago
Sensor and Information Fusion Applied to a Robotic Soccer Team
This paper is focused on the sensor and information fusion techniques used by a robotic soccer team. Due to the fact that the sensor information is affected by noise, and taking in...
João Silva, Nuno Lau, João Rodrigues...