Sciweavers

6812 search results - page 1308 / 1363
» Detection of Information Flows
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
COLCOM
2008
IEEE
14 years 2 months ago
Data Quality and Failures Characterization of Sensing Data in Environmental Applications
Environmental monitoring is one of the most important sensor network application domains. The success of those applications is determined by the quality of the collected data. Thu...
Kewei Sha, Guoxing Zhan, Safwan Al-Omari, Tim Cala...
ICC
2008
IEEE
197views Communications» more  ICC 2008»
14 years 2 months ago
V-BLAST Receiver and Performance In MIMO Relay Networks with Imperfect CSI
Abstract —Previous work demonstrated that the improvements in spectral efficiency and link reliability can be obtained in wireless relay networks employing terminals with MIMO c...
Jiansong Chen, Xiaoli Yu, C. C. Jay Kuo
ICDM
2008
IEEE
97views Data Mining» more  ICDM 2008»
14 years 2 months ago
Semi-supervised Learning from General Unlabeled Data
We consider the problem of Semi-supervised Learning (SSL) from general unlabeled data, which may contain irrelevant samples. Within the binary setting, our model manages to better...
Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. L...
IROS
2008
IEEE
148views Robotics» more  IROS 2008»
14 years 2 months ago
Identifying a moving object with an accelerometer in a camera view
— This paper proposes a method for identifying an object which contains an accelerometer out of many moving objects in the view of a stationary camera using motion data obtained ...
Osamu Shigeta, Shingo Kagami, Koichi Hashimoto
« Prev « First page 1308 / 1363 Last » Next »