Sciweavers

1051 search results - page 135 / 211
» group 2009
Sort
View
105
Voted
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 10 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
PERVASIVE
2009
Springer
15 years 10 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
CCECE
2009
IEEE
15 years 10 months ago
A distributed and cooperative supervisory estimation of multi-agent systems - Part I: Framework
Abstract—In this work, we propose a framework for supervisory cooperative estimation of multi-agent linear time-invariant (LTI) systems. We introduce a group of sub-observers, ea...
Seyyedmohsen Azizi, Mani M. Tousi, Kash Khorasani
CSE
2009
IEEE
15 years 10 months ago
Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem
Abstract: Nowadays, it has become common to equip a device with Bluetooth. As such devices become pervasive in the world; much work has been done on forming them into a network, ho...
Yanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhan...
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
15 years 10 months ago
Enabling concurrent clock and power gating in an industrial design flow
— Clock-gating and power-gating have proven to be very effective solutions for reducing dynamic and static power, respectively. The two techniques may be coupled in such a way th...
Leticia Maria Veiras Bolzani, Andrea Calimera, Alb...