Sciweavers

670 search results - page 23 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
DEXAW
2010
IEEE
215views Database» more  DEXAW 2010»
13 years 8 months ago
An Evaluation Approach for Dynamics-Aware Applications Using Linked Data
One possible threat to linked data quality is the lack of knowledge about the dynamics in dependent remote datasets. Linked data consuming applications often need to be aware of ch...
Niko Popitsch, Bernhard Haslhofer, Elaheh Momeni R...
ICMCS
2009
IEEE
118views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Histogram matching for music repetition detection
Repetition detection is a fundamental issue for music thumbnailing and summarization. In this paper, we propose a new feature, called chroma histogram, which enables us to find ou...
Aibo Tian, Wen Li, Linxing Xiao, Dong Wang, Jie Zh...
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
GI
2009
Springer
13 years 5 months ago
An Improved Method for creating Shared Belief in Communication Constrained Sensor Networks
: Networked systems that gather sensor data in order to react to phenomena in their surroundings are faced with a growing need for adaptive behavior to operate in dynamically chang...
Eelke van Foeken, Peter Hiemstra, Leon Kester
CSL
2010
Springer
13 years 6 months ago
Voice activity detection based on statistical models and machine learning approaches
The voice activity detectors (VADs) based on statistical models have shown impressive performances especially when fairly precise statistical models are employed. Moreover, the ac...
Jong Won Shin, Joon-Hyuk Chang, Nam Soo Kim