Sciweavers

1081 search results - page 129 / 217
» Challenges: an application model for pervasive computing
Sort
View
VISUALIZATION
2003
IEEE
15 years 9 months ago
Producing High Quality Visualizations of Large-Scale Simulations
This paper describes the work of a team of researchers in computer graphics, geometric computing, and civil engineering to produce a visualization of the September 2001 attack on ...
Voicu Popescu, Chris Hoffmann, Sami Kilic, Mete So...
PKDD
2005
Springer
101views Data Mining» more  PKDD 2005»
15 years 9 months ago
A Random Method for Quantifying Changing Distributions in Data Streams
In applications such as fraud and intrusion detection, it is of great interest to measure the evolving trends in the data. We consider the problem of quantifying changes between tw...
Haixun Wang, Jian Pei
CONEXT
2008
ACM
15 years 6 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar
RTCSA
2003
IEEE
15 years 9 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
JMLR
2010
165views more  JMLR 2010»
14 years 11 months ago
Feature Selection: An Ever Evolving Frontier in Data Mining
The rapid advance of computer technologies in data processing, collection, and storage has provided unparalleled opportunities to expand capabilities in production, services, comm...
Huan Liu, Hiroshi Motoda, Rudy Setiono, Zheng Zhao