Sciweavers

3010 search results - page 546 / 602
» Challenges in Visual Data Analysis
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 3 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
TSP
2010
13 years 3 months ago
Code design for radar STAP via optimization theory
Abstract--In this paper, we deal with the problem of constrained code optimization for radar space-time adaptive processing (STAP) in the presence of colored Gaussian disturbance. ...
Antonio De Maio, Silvio De Nicola, Yongwei Huang, ...
PPOPP
2011
ACM
12 years 11 months ago
OoOJava: software out-of-order execution
Developing parallel software using current tools can be challenging. Even experts find it difficult to reason about the use of locks and often accidentally introduce race condit...
James Christopher Jenista, Yong Hun Eom, Brian Dem...
TITB
2010
197views Education» more  TITB 2010»
13 years 3 months ago
Detection of left ventricular motion abnormality via information measures and Bayesian filtering
We present an original information theoretic measure of heart motion based on the Shannon's differential entropy (SDE), which allows heart wall motion abnormality detection. B...
Kumaradevan Punithakumar, Ismail Ben Ayed, Ian G. ...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 11 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang