Sciweavers

1050 search results - page 210 / 210
» Two methods of authenticated positioning
Sort
View
ICMLA
2009
13 years 8 months ago
Learning Geographic Regions using Location Based Services in Next Generation Networks
Abstract--In this paper we apply classification to learn geographic regions using Location Based Services (LBS) in Next Generation Networks (NGN). We assume that the information in...
Yuheng He, Attila Bilgic
TITS
2011
165views more  TITS 2011»
13 years 5 months ago
Robust Inference of Principal Road Paths for Intelligent Transportation Systems
Abstract—Over the last few years, electronic vehicle guidance systems have become increasingly more popular. However, despite their ubiquity, performance will always be subject t...
Gabriel Agamennoni, Juan Nieto, Eduardo Mario Nebo...
WWW
2011
ACM
13 years 5 months ago
Automatic construction of a context-aware sentiment lexicon: an optimization approach
The explosion of Web opinion data has made essential the need for automatic tools to analyze and understand people’s sentiments toward different topics. In most sentiment analy...
Yue Lu, Malú Castellanos, Umeshwar Dayal, C...
BIBE
2010
IEEE
169views Bioinformatics» more  BIBE 2010»
13 years 2 months ago
A Novel Wavelet Based Algorithm for Spike and Wave Detection in Absence Epilepsy
—Absence seizures are characterized by sudden loss of consciousness and interruption of ongoing motor activities for a brief period of time lasting few to several seconds and up ...
Petros Xanthopoulos, Steffen Rebennack, Chang-Chia...
SOFSEM
2012
Springer
12 years 6 months ago
Turing Machines for Dummies - Why Representations Do Matter
Abstract. Various methods exists in the literature for denoting the configuration of a Turing Machine. A key difference is whether the head position is indicated by some integer ...
Peter van Emde Boas