Sciweavers

1498 search results - page 215 / 300
» Collection tree protocol
Sort
View
PERVASIVE
2004
Springer
14 years 2 months ago
Activity Recognition from User-Annotated Acceleration Data
Abstract. In this work, algorithms are developed and evaluated to detect physical activities from data acquired using five small biaxial accelerometers worn simultaneously on di...
Ling Bao, Stephen S. Intille
LICS
2003
IEEE
14 years 2 months ago
Model-checking Trace Event Structures
Given a regular collection of Mazurkiewicz traces, which can be seen as the behaviours of a finite-state concurrent system, one can associate with it a canonical regular event st...
P. Madhusudan
ERCIMDL
2003
Springer
106views Education» more  ERCIMDL 2003»
14 years 2 months ago
Topical Crawling for Business Intelligence
Abstract. The Web provides us with a vast resource for business intelligence. However, the large size of the Web and its dynamic nature make the task of foraging appropriate inform...
Gautam Pant, Filippo Menczer
ICCBR
2003
Springer
14 years 2 months ago
Index Driven Selective Sampling for CBR
In real environments it is often difficult to obtain a collection of cases for the case base that would cover all the problem solving situations. Although it is often somewhat eas...
Nirmalie Wiratunga, Susan Craw, Stewart Massie
ICPR
2002
IEEE
14 years 2 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow