Sciweavers

303 search results - page 47 / 61
» Sensor Integration in the Security Domain
Sort
View
DS
1997
104views Database» more  DS 1997»
13 years 8 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
ICASSP
2008
IEEE
14 years 1 months ago
Air-coupled ultrasound time-of-flight estimation for shipping container cargo verification
The falling cost of embedded sensor systems has opened up the possibility of in-transit air-coupled ultrasound interior imaging of shipping container cargo. This new technology co...
Patrick McVittie, Les E. Atlas
CVPR
2010
IEEE
14 years 3 months ago
A Theory of Plenoptic Multiplexing
Multiplexing is a common technique for encoding highdimensional image data into a single, two-dimensional image. Examples of spatial multiplexing include Bayer patterns to capture...
Ivo Ihrke, Gordon Wetzstein, Wolfgang Heidrich
CONCURRENCY
2008
89views more  CONCURRENCY 2008»
13 years 7 months ago
An experiment with reflective middleware to support grid-based flood monitoring
Flooding is a growing problem, which affects more than 10% of the UK population. The cost of damage caused by flooding correlates closely with the warning time given before a floo...
Danny Hughes, Phil Greenwood, Gordon S. Blair, Geo...
CSREASAM
2006
13 years 8 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...