Sciweavers

2347 search results - page 301 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
ICMT
2010
Springer
13 years 6 months ago
Implementing Business Process Recovery Patterns through QVT Transformations
Traditionally, software maintenance takes only technical information into account to evolve legacy systems. However, business knowledge, which could help to improve the comprehensi...
Ricardo Pérez-Castillo, Ignacio Garcí...
INFOCOM
2010
IEEE
13 years 6 months ago
Compressive Sensing Based Positioning Using RSS of WLAN Access Points
Abstract— The sparse nature of location finding problem makes the theory of compressive sensing desirable for indoor positioning in Wireless Local Area Networks (WLANs). In this...
Chen Feng, Wain Sy Anthea Au, Shahrokh Valaee, Zhe...
SCP
2010
148views more  SCP 2010»
13 years 6 months ago
Debugging hygienic macros
Over the past two decades, Scheme macros have evolved into a powerful API for the compiler front-end. Like Lisp macros, their predecessors, Scheme macros expand source programs in...
Ryan Culpepper, Matthias Felleisen
TAP
2010
Springer
191views Hardware» more  TAP 2010»
13 years 6 months ago
Mesh saliency and human eye fixations
raction, simplification, segmentation, illumination, rendering, and illustration. Even though this technique is inspired by models of low-level human vision, it has not yet been v...
Youngmin Kim, Amitabh Varshney, David W. Jacobs, F...
TKDE
2010
251views more  TKDE 2010»
13 years 6 months ago
Clustering Uncertain Data Using Voronoi Diagrams and R-Tree Index
—We study the problem of clustering uncertain objects whose locations are described by probability density functions (pdf). We show that the UK-means algorithm, which generalises...
Ben Kao, Sau Dan Lee, Foris K. F. Lee, David Wai-L...