Sciweavers

2038 search results - page 368 / 408
» Loops under Strategies
Sort
View
139
Voted
MOBISYS
2004
ACM
16 years 3 months ago
Energy-Efficient Surveillance System Using Wireless Sensor Networks
The focus of surveillance missions is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of ri...
Tian He, Sudha Krishnamurthy, John A. Stankovic, T...
131
Voted
SDM
2009
SIAM
170views Data Mining» more  SDM 2009»
16 years 27 days ago
Optimal Distance Bounds on Time-Series Data.
Most data mining operations include an integral search component at their core. For example, the performance of similarity search or classification based on Nearest Neighbors is ...
Michail Vlachos, Philip S. Yu, Suleyman S. Kozat
167
Voted
MIR
2010
ACM
232views Multimedia» more  MIR 2010»
15 years 10 months ago
Exploiting external knowledge to improve video retrieval
Most video retrieval systems are multimodal, commonly relying on textual information, low- and high-level semantic features extracted from query visual examples. In this work, we ...
David Vallet, Iván Cantador, Joemon M. Jose
135
Voted
HYBRID
2010
Springer
15 years 10 months ago
Compositional analysis for linear control systems
The complexity of physical and engineering systems, both in terms of the governing physical phenomena and the number of subprocesses involved, is mirrored in ever more complex mat...
Florian Kerber, Arjan van der Schaft
137
Voted
SAC
2009
ACM
15 years 10 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...