Sciweavers

2446 search results - page 376 / 490
» Principles of dataspace systems
Sort
View
OZCHI
2009
ACM
14 years 4 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
SAC
2009
ACM
14 years 4 months ago
Parameterless outlier detection in data streams
Outlyingness is a subjective concept relying on the isolation level of a (set of) record(s). Clustering-based outlier detection is a field that aims to cluster data and to detect...
Alice Marascu, Florent Masseglia
SENSYS
2009
ACM
14 years 4 months ago
Experiences with a high-fidelity wireless building energy auditing network
We describe the design, deployment, and experience with a wireless sensor network for high-fidelity monitoring of electrical usage in buildings. A network of 38 mote-class AC met...
Xiaofan Jiang, Minh Van Ly, Jay Taneja, Prabal Dut...
IROS
2009
IEEE
186views Robotics» more  IROS 2009»
14 years 3 months ago
Robotic submerged microhandling controlled by pH swithching
— Robotic microhandling is a promising way to assemble microcomponents in order to manufacture new generation of Hybrid Micro ElectroMechanical Systems (HMEMS). However, at the s...
Jérôme Dejeu, Patrick Rougeot, Micha&...
ISORC
2009
IEEE
14 years 3 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega