Sciweavers

2025 search results - page 194 / 405
» On the Utility of Inference Mechanisms
Sort
View
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
14 years 2 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
14 years 2 months ago
A SVM-based Method for Engine Maintenance Strategy Optimization
— Due to the abundant application background, the optimization of maintenance problem has been extensively studied in the past decades. Besides the well-known difficulty of larg...
Qing-Shan Jia, Qianchuan Zhao
ROBIO
2006
IEEE
110views Robotics» more  ROBIO 2006»
14 years 2 months ago
Visualization and Estimation of Contact Stimuli using Living Microorganisms
— In this paper, we propose a novel microsensing scheme in which intrinsic sensing capability in microorganisms is utilized. Extraction of signals inside the cell and decoding of...
Anchelee Davies, Naoko Ogawa, Hiromasa Oku, Koichi...
SWS
2006
ACM
14 years 2 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
PEWASUN
2005
ACM
14 years 1 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari