Sciweavers

779 search results - page 73 / 156
» Modeling Dependable Systems using Hybrid Bayesian Networks
Sort
View
JCIT
2010
185views more  JCIT 2010»
13 years 3 months ago
GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter
Generally, accuracy of GPS(Global Positioning System) is higher than that of cellular network. But in tall building urban area or indoor, relatively weak GPS signal makes the posi...
Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu
EWSN
2004
Springer
14 years 8 months ago
Context-Aware Sensors
Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
Eiman Elnahrawy, Badri Nath
LSO
2004
Springer
14 years 2 months ago
COTS Evaluation Supported by Knowledge Bases
Selection of Commercial-off-The-Shelf (COTS) software products is a knowledge-intensive process. In this paper, we show how knowledge bases can be used to facilitate the COTS selec...
Abdallah Mohamed, Tom Wanyama, Günther Ruhe, ...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 6 months ago
Trust network inference for online rating data using generative models
In an online rating system, raters assign ratings to objects contributed by other users. In addition, raters can develop trust and distrust on object contributors depending on a f...
Freddy Chong Tat Chua, Ee-Peng Lim
JAIHC
2010
205views more  JAIHC 2010»
13 years 7 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi