Sciweavers

3176 search results - page 498 / 636
» A Multi-Resolution Relational Data Model
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
COGSCI
2006
127views more  COGSCI 2006»
13 years 9 months ago
Decision Making and Confidence Given Uncertain Advice
We study human decision making in a simple forced-choice task that manipulates the frequency and accuracy of available information. Empirically, we find that people make decisions...
Michael D. Lee, Matthew J. Dry
MP
2006
101views more  MP 2006»
13 years 8 months ago
Robust optimization of contaminant sensor placement for community water systems
We present a series of related robust optimization models for placing sensors in municipal water networks to detect contaminants that are maliciously or accidentally injected. We f...
Robert D. Carr, Harvey J. Greenberg, William E. Ha...
TCSV
2008
291views more  TCSV 2008»
13 years 8 months ago
A Statistical Video Content Recognition Method Using Invariant Features on Object Trajectories
Abstract--This work is dedicated to a statistical trajectorybased approach addressing two issues related to dynamic video content understanding: recognition of events and detection...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
IMC
2010
ACM
13 years 6 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...