Sciweavers

575 search results - page 82 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
VLSID
2005
IEEE
285views VLSI» more  VLSID 2005»
14 years 8 months ago
Power Monitors: A Framework for System-Level Power Estimation Using Heterogeneous Power Models
Abstract--Power analysis early in the design cycle is critical for the design of lowpower systems. With the move to system-level specifications and design methodologies, there has ...
Nikhil Bansal, Kanishka Lahiri, Anand Raghunathan,...
VISSYM
2007
13 years 10 months ago
Flexible And Topologically Localized Segmentation
One of the most common visualization tasks is the extraction of significant boundaries, often performed with isosurfaces or level set segmentation. Isosurface extraction is simple...
Gunnar Johansson, Ken Museth, Hamish Carr
ICPR
2006
IEEE
14 years 8 months ago
Precision-recall operating characteristic (P-ROC) curves in imprecise environments
Traditionally, machine learning algorithms have been evaluated in applications where assumptions can be reliably made about class priors and/or misclassification costs. In this pa...
Thomas Landgrebe, Pavel Paclík, Robert P. W...
P2P
2006
IEEE
153views Communications» more  P2P 2006»
14 years 1 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
HAPTICS
2005
IEEE
14 years 1 months ago
Wearable Kinesthetic System for Capturing and Classifying Upper Limb Gesture
Background: Monitoring body kinematics has fundamental relevance in several biological and technical disciplines. In particular the possibility to exactly know the posture may fur...
R. Bartalesi, Federico Lorussi, M. Tesconi, Alessa...