Sciweavers

807 search results - page 62 / 162
» Deploying and evaluating a location-aware system
Sort
View
SDM
2010
SIAM
156views Data Mining» more  SDM 2010»
13 years 11 months ago
Unsupervised Discovery of Abnormal Activity Occurrences in Multi-dimensional Time Series, with Applications in Wearable Systems
We present a method for unsupervised discovery of abnormal occurrences of activities in multi-dimensional time series data. Unsupervised activity discovery approaches differ from ...
Alireza Vahdatpour, Majid Sarrafzadeh
SIMUTOOLS
2008
13 years 11 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...
SAC
2010
ACM
13 years 8 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
SUTC
2010
IEEE
13 years 8 months ago
Transaction-Level Modeling for Sensor Networks Using SystemC
—As sensor networks are finding widespread use across many applications, designers increasingly must not only focus on application development, but also on sensor network optimiz...
Jeff Hiner, Ashish Shenoy, Roman L. Lysecky, Susan...
HOST
2008
IEEE
14 years 4 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach