Sciweavers

352 search results - page 30 / 71
» The Power of Experience: On the Usefulness of Validation Kno...
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
13 years 8 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
TASLP
2008
100views more  TASLP 2008»
13 years 8 months ago
Noise Tracking Using DFT Domain Subspace Decompositions
All discrete Fourier transform (DFT) domain-based speech enhancement gain functions rely on knowledge of the noise power spectral density (PSD). Since the noise PSD is unknown in a...
Richard C. Hendriks, Jesper Jensen, Richard Heusde...
PERCOM
2010
ACM
13 years 6 months ago
PerFallD: A pervasive fall detection system using mobile phones
Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging "baby boomers", fall dete...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
IROS
2006
IEEE
147views Robotics» more  IROS 2006»
14 years 2 months ago
Opportunistic Use of Vision to Push Back the Path-Planning Horizon
Abstract— Mobile robots need maps or other forms of geometric information about the environment to navigate. The mobility sensors (LADAR, stereo, etc.) on these robotic vehicles ...
Bart C. Nabbe, Derek Hoiem, Alexei A. Efros, Marti...
KBS
2007
100views more  KBS 2007»
13 years 8 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...