Sciweavers

6693 search results - page 34 / 1339
» On an anytime algorithm for control
Sort
View
CBMS
2007
IEEE
14 years 3 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
NBIS
2007
Springer
14 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
JANCL
2002
121views more  JANCL 2002»
13 years 8 months ago
Approximate coherence-based reasoning
ABSTRACT. It has long been recognized that the concept of inconsistency is a central part of commonsense reasoning. In this issue, a number of authors have explored the idea of rea...
Frédéric Koriche
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 8 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral