Sciweavers

88 search results - page 12 / 18
» Fight risk with risk: reflexivity of risk and globalization ...
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
SIES
2009
IEEE
14 years 2 months ago
A wireless body sensor network for the prevention and management of asthma
—We present an application of an open source platform for wireless body sensor network called DexterNet to the problem of children’s asthma. The architecture of the system cons...
Edmund Y. W. Seto, Annarita Giani, Victor Shia, Cu...
ICRA
2008
IEEE
140views Robotics» more  ICRA 2008»
14 years 1 months ago
Planning in information space for a quadrotor helicopter in a GPS-denied environment
— This paper describes a motion planning algorithm for a quadrotor helicopter flying autonomously without GPS. Without accurate global positioning, the vehicle’s ability to lo...
Ruijie He, Sam Prentice, Nicholas Roy
ICON
2007
IEEE
14 years 1 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen
DAWAK
2006
Springer
13 years 11 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...