Sciweavers

1140 search results - page 42 / 228
» Active Information Networks and XML
Sort
View
IH
2004
Springer
14 years 2 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
PERCOM
2011
ACM
13 years 15 days ago
Is ontology-based activity recognition really effective?
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
PERCOM
2003
ACM
14 years 2 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
AAAI
2010
13 years 10 months ago
Active Inference for Collective Classification
Labeling nodes in a network is an important problem that has seen a growing interest. A number of methods that exploit both local and relational information have been developed fo...
Mustafa Bilgic, Lise Getoor
DEBU
2006
163views more  DEBU 2006»
13 years 8 months ago
Towards Activity Databases: Using Sensors and Statistical Models to Summarize People's Lives
Automated reasoning about human behavior is a central goal of artificial intelligence. In order to engage and intervene in a meaningful way, an intelligent system must be able to ...
Tanzeem Choudhury, Matthai Philipose, Danny Wyatt,...