Sciweavers

1997 search results - page 364 / 400
» A Model for Data Leakage Detection
Sort
View
EMNETS
2007
14 years 2 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 2 months ago
Self-Interference Suppression in Doubly-Selective Channel Estimation Using Superimposed Training
Abstract-- Channel estimation for frequency-selective timevarying channels is considered using superimposed training. We employ a discrete prolate spheroidal basis expansion model ...
Shuangchi He, Jitendra K. Tugnait
AFRIGRAPH
2001
ACM
14 years 2 months ago
A gesture processing framework for multimodal interaction in virtual reality
This article presents a gesture detection and analysis framework for modelling multimodal interactions. It is particulary designed for its use in Virtual Reality (VR) applications...
Marc Erich Latoschik
DAGSTUHL
2010
14 years 13 days ago
Tracking Lines in Higher Order Tensor Fields
While tensors occur in many areas of science and engineering, little has been done to visualize tensors with order higher than two. Tensors of higher orders can be used for exampl...
Mario Hlawitschka, Gerik Scheuermann
IJCAI
2007
14 years 12 days ago
Locating Complex Named Entities in Web Text
Named Entity Recognition (NER) is the task of locating and classifying names in text. In previous work, NER was limited to a small number of predefined entity classes (e.g., peop...
Doug Downey, Matthew Broadhead, Oren Etzioni