Sciweavers

783 search results - page 90 / 157
» Evaluating impact of manageability features on device perfor...
Sort
View
VLDB
2000
ACM
118views Database» more  VLDB 2000»
13 years 11 months ago
Decision Tables: Scalable Classification Exploring RDBMS Capabilities
In this paper, we report our success in building efficient scalable classifiers in the form of decision tables by exploring capabilities of modern relational database management s...
Hongjun Lu, Hongyan Liu
SENSYS
2004
ACM
14 years 1 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...
TAMODIA
2008
13 years 9 months ago
A Fluid Flow Approach to Usability Analysis of Multi-user Systems
Abstract. The analysis of usability aspects of multi-user systems, such as cooperative work systems and pervasive systems, pose particular problems because group behavior of their ...
Mieke Massink, Diego Latella, Maurice H. ter Beek,...
ICPR
2010
IEEE
13 years 8 months ago
Robust Gait Recognition Against Speed Variation
—Variations in walking speed have a strong impact on the recognition of gait. We propose a method of recognition of gait that is robust against walking-speed variations. It is es...
Muhammad Rasyid Aqmar, Koichi Shinoda, Sadaoki Fur...
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang