Sciweavers

320 search results - page 42 / 64
» An approach for implicitly detecting information needs
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 7 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ICNP
2003
IEEE
14 years 29 days ago
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks
Abstract—In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the...
Wei-Peng Chen, Jennifer C. Hou, Lui Sha
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 3 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
EDBT
2006
ACM
202views Database» more  EDBT 2006»
14 years 7 months ago
Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams
Advances of sensor and RFID technology provide significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identific...
Fusheng Wang, Shaorong Liu, Peiya Liu, Yijian Bai
ICARCV
2006
IEEE
164views Robotics» more  ICARCV 2006»
14 years 1 months ago
Fast Object Extraction from Bayesian Occupancy Grids using Self Organizing Networks
— Despite their popularity, occupancy grids cannot be directly applied to problems where the identity of the objects populating an environment needs to be taken into account (eg ...
Dizan Vasquez, Fabrizio Romanelli, Thierry Fraicha...