Sciweavers

906 search results - page 151 / 182
» Role Transfer Problems and Algorithms
Sort
View
JAMIA
2011
87views more  JAMIA 2011»
12 years 10 months ago
Can poison control data be used for pharmaceutical poisoning surveillance?
the title of a report to view the full citation and abstract. s of these reports are available now 169 unique articles this week Age: Adolescents A closer look at co-rumination: Ge...
Christopher A. Naun, Cody S. Olsen, J. Michael Dea...
ICDAR
2011
IEEE
12 years 7 months ago
Tuning between Exponential Functions and Zones for Membership Functions Selection in Voronoi-Based Zoning for Handwritten Charac
— In Handwritten Character Recognition, zoning is rigtly considered as one of the most effective feature extraction techniques. In the past, many zoning methods have been propose...
Sebastiano Impedovo, Giuseppe Pirlo
GLOBECOM
2008
IEEE
14 years 1 months ago
Multi-Cluster Multi-Parent Wake-Up Scheduling in Delay-Sensitive Wireless Sensor Networks
—Immediate notification of urgent but rare events and delivery of time sensitive actuation commands appear in many practical wireless sensor and actuator network applications. M...
Huang Lee, Abtin Keshavarzian, Hamid K. Aghajan
CODES
2006
IEEE
14 years 1 months ago
Multi-processor system design with ESPAM
For modern embedded systems, the complexity of embedded applications has reached a point where the performance requirements of these applications can no longer be supported by emb...
Hristo Nikolov, Todor Stefanov, Ed F. Deprettere
CCS
2010
ACM
13 years 7 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler