Sciweavers

1036 search results - page 173 / 208
» Utilizing Validation Experience for System Validation
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Abstract—Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by v...
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen ...
ICRA
2006
IEEE
180views Robotics» more  ICRA 2006»
14 years 1 months ago
Development of Wearable Sensor Combinations for Human Lower Extremity Motion Analysis
– A wearable sensory system for human lower extremity motion analysis is proposed, and an intelligent computation method for this sensory system is presented. The standard method...
Tao Liu, Yoshio Inoue, Kyoko Shibata, Haruhiko Mor...
IEEEARES
2007
IEEE
14 years 2 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
CLUSTER
2005
IEEE
14 years 1 months ago
Minimizing the Network Overhead of Checkpointing in Cycle-harvesting Cluster Environments
Cycle-harvesting systems such as Condor have been developed to make desktop machines in a local area (which are often similar to clusters in hardware configuration) available as ...
Daniel Nurmi, John Brevik, Richard Wolski
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 1 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...