Sciweavers

1513 search results - page 288 / 303
» Evaluation of User-Interfaces for Mobile Application Develop...
Sort
View
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 3 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
ICASSP
2011
IEEE
13 years 10 days ago
Detection of targets embedded in multipath clutter with Time Reversal
—Detection of targets in complex environments is of importance in both radar and sonar applications. Recent work has shown that the use of Time Reversal (TR) techniques improves ...
Nicholas O'Donoughue, Joel Harley, José M. ...
DMIN
2006
131views Data Mining» more  DMIN 2006»
13 years 10 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
ICDCS
2010
IEEE
13 years 8 months ago
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems
—Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with mult...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 2 months ago
Empirical Discussion on Directional MAC Protocols for Ad hoc Networks using Practice Smart Antennas
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
Masahiro Watanabe, Hikaru Mitsuhashi, Masaki Banda...