Sciweavers

928 search results - page 160 / 186
» Safety management of complex technology
Sort
View
CIKM
1994
Springer
14 years 2 months ago
Hashing by Proximity to Process Duplicates in Spatial Databases
In a spatial database, an object may extend arbitrarily in space. As a result, many spatial data structures e.g., the quadtree, the cell tree, the R+-tree represent an object by p...
Walid G. Aref, Hanan Samet
IDA
2010
Springer
14 years 2 months ago
Deterministic Finite Automata in the Detection of EEG Spikes and Seizures
This Paper presents a platform to mine epileptiform activity from Electroencephalograms (EEG) by combining the methodologies of Deterministic Finite Automata (DFA) and Knowledge Di...
Rory A. Lewis, Doron Shmueli, Andrew M. White
EATIS
2007
ACM
14 years 1 months ago
Ontology Based Affective Context Representation
In this paper we propose an ontology based representation of the affective states for context aware applications that allows expressing the complex relations that are among the af...
Kuderna-Iulian Benta, Anca Rarau, Marcel Cremene
CIT
2006
Springer
14 years 1 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
EMISA
2006
Springer
14 years 1 months ago
Challenges and Solutions in Planning Information Systems for Networked Value Constellations
: Nowadays businesses often decide to form networked value constellations in order to satisfy complex customer needs. To fulfill the value-based requirements of an e-Business idea ...
Novica Zarvic, Maya Daneva