Sciweavers

7984 search results - page 1593 / 1597
» Exploring personal information
Sort
View
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 2 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
ICASSP
2011
IEEE
12 years 11 months ago
Improving acoustic event detection using generalizable visual features and multi-modality modeling
Acoustic event detection (AED) aims to identify both timestamps and types of multiple events and has been found to be very challenging. The cues for these events often times exist...
Po-Sen Huang, Xiaodan Zhuang, Mark Hasegawa-Johnso...
ICDE
2011
IEEE
234views Database» more  ICDE 2011»
12 years 11 months ago
How schema independent are schema free query interfaces?
— Real-world databases often have extremely complex schemas. With thousands of entity types and relationships, each with a hundred or so attributes, it is extremely difficult fo...
Arash Termehchy, Marianne Winslett, Yodsawalai Cho...
BMCBI
2011
12 years 11 months ago
Gene set analysis for longitudinal gene expression data
Background: Gene set analysis (GSA) has become a successful tool to interpret gene expression profiles in terms of biological functions, molecular pathways, or genomic locations. ...
Ke Zhang, Haiyan Wang, Arne C. Bathke, Solomon W. ...
CHI
2011
ACM
12 years 11 months ago
Your noise is my command: sensing gestures using the body as an antenna
Touch sensing and computer vision have made humancomputer interaction possible in environments where keyboards, mice, or other handheld implements are not available or desirable. ...
Gabe Cohn, Daniel Morris, Shwetak N. Patel, Desney...
« Prev « First page 1593 / 1597 Last » Next »