Sciweavers

2414 search results - page 441 / 483
» Computing Normal Subgroups
Sort
View
ISWC
1998
IEEE
13 years 12 months ago
Parasitic Power Harvesting in Shoes
system to date has served all of the needs of wearable computing--light weight, minimum effort, high power generation, convenient power delivery, and good power regulation. We beli...
John Kymissis, Clyde Kendall, Joseph A. Paradiso, ...
CVPR
1996
IEEE
13 years 11 months ago
What is the set of images of an object under all possible lighting conditions?
The appearance of a particular object depends on both the viewpoint from which it is observed and the light sources by which it is illuminated. If the appearance of two objects is...
Peter N. Belhumeur, David J. Kriegman
ACSAC
2009
IEEE
13 years 11 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ICDCS
2010
IEEE
13 years 11 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ICDCS
2010
IEEE
13 years 11 months ago
A Hybrid Approach to High Availability in Stream Processing Systems
Abstract—Stream processing is widely used by today’s applications such as financial data analysis and disaster response. In distributed stream processing systems, machine fail...
Zhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, ...