Sciweavers

2953 search results - page 447 / 591
» A Feature Selection Technique based on Distributional Differ...
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
SBBD
2004
128views Database» more  SBBD 2004»
13 years 10 months ago
Integrating Heterogeneous Data Sources in Flexible and Dynamic Environments
Flexible and dynamic environments are characterized by high independence from connection participants, low control over available services and high tolerance to communication fail...
Angelo Brayner, Marcelo Meirelles
BPM
2006
Springer
103views Business» more  BPM 2006»
14 years 29 days ago
IT Support for Release Management Processes in the Automotive Industry
Abstract. Car development is based on long running, concurrently executed and highly dependent processes. The coordination and synchronization of these processes has become a compl...
Dominic Müller, Joachim Herbst, Markus Hammor...
COST
2008
Springer
287views Multimedia» more  COST 2008»
13 years 11 months ago
Facial Expressions Recognition from Image Sequences
Abstract. Human machine interaction is one of the emerging fields for the coming years. Interacting with others in our daily life is a face to face interaction. Faces are the natur...
Zahid Riaz, Christoph Mayer, Michael Beetz, Bernd ...
AAAI
2008
13 years 11 months ago
ARMOR Security for Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Fernando Ordó&ntil...