Sciweavers

2953 search results - page 447 / 591
» A Feature Selection Technique based on Distributional Differ...
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
133
Voted
SBBD
2004
128views Database» more  SBBD 2004»
15 years 5 months ago
Integrating Heterogeneous Data Sources in Flexible and Dynamic Environments
Flexible and dynamic environments are characterized by high independence from connection participants, low control over available services and high tolerance to communication fail...
Angelo Brayner, Marcelo Meirelles
135
Voted
BPM
2006
Springer
103views Business» more  BPM 2006»
15 years 7 months ago
IT Support for Release Management Processes in the Automotive Industry
Abstract. Car development is based on long running, concurrently executed and highly dependent processes. The coordination and synchronization of these processes has become a compl...
Dominic Müller, Joachim Herbst, Markus Hammor...
169
Voted
COST
2008
Springer
287views Multimedia» more  COST 2008»
15 years 5 months ago
Facial Expressions Recognition from Image Sequences
Abstract. Human machine interaction is one of the emerging fields for the coming years. Interacting with others in our daily life is a face to face interaction. Faces are the natur...
Zahid Riaz, Christoph Mayer, Michael Beetz, Bernd ...
135
Voted
AAAI
2008
15 years 6 months ago
ARMOR Security for Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Fernando Ordó&ntil...