Sciweavers

2135 search results - page 49 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
WMCSA
2008
IEEE
14 years 3 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
ICA
2007
Springer
14 years 2 months ago
Linear Prediction Based Blind Source Extraction Algorithms in Practical Applications
Blind source extraction (BSE) is of advantages over blind source separation (BSS) when obtaining some underlying source signals from high dimensional observed signals. Among a vari...
Zhi-Lin Zhang, Liqing Zhang
GRID
2003
Springer
14 years 1 months ago
From Web Services to OGSA: Experiences in Implementing an OGSA-based Grid Application
In previous work we have presented the ZENTURIO experiment management system for performance and parameter studies of parallel and distributed applications on cluster and Grid arc...
Radu Prodan, Thomas Fahringer
ISAAC
2001
Springer
98views Algorithms» more  ISAAC 2001»
14 years 1 months ago
Fragmentary Pattern Matching: Complexity, Algorithms and Applications for Analyzing Classic Literary Works
A fragmentary pattern is a multiset of non-empty strings, and it matches a string w if all the strings in it occur within w without any overlaps. We study some fundamental issues o...
Hideaki Hori, Shinichi Shimozono, Masayuki Takeda,...
IDEAL
2010
Springer
13 years 7 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...