Sciweavers

993 search results - page 189 / 199
» Localization for Anchoritic Sensor Networks
Sort
View
ICOST
2009
Springer
14 years 3 months ago
Pervasive Informatics and Persistent Actimetric Information in Health Smart Homes
This paper discuss the ability to obtain a reliable pervasive information at home from a network of localizing sensors allowing to follow the different locations at which a depend...
Yannick Fouquet, Nicolas Vuillerme, Jacques Demong...
ICRA
2005
IEEE
109views Robotics» more  ICRA 2005»
14 years 2 months ago
Towards an Estimate of Confidence in a Road-Matched Location
- This paper describes a method that provides an estimated location of an outdoor vehicle relative to a digital road map using Belief Theory and Kalman filtering. Firstly, an Exten...
Maan E. El Najjar, Philippe Bonnifait
WS
2006
ACM
14 years 2 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
RTAS
2009
IEEE
14 years 3 months ago
Execution Strategies for PTIDES, a Programming Model for Distributed Embedded Systems
—We define a family of execution policies for a programming model called PTIDES (Programming Temporally Integrated Distributed Embedded Systems). A PTIDES application (factory a...
Jia Zou, Slobodan Matic, Edward A. Lee, Thomas Hui...
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...