Sciweavers

1051 search results - page 135 / 211
» group 2009
Sort
View
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 5 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
PERVASIVE
2009
Springer
14 years 5 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
CCECE
2009
IEEE
14 years 5 months ago
A distributed and cooperative supervisory estimation of multi-agent systems - Part I: Framework
Abstract—In this work, we propose a framework for supervisory cooperative estimation of multi-agent linear time-invariant (LTI) systems. We introduce a group of sub-observers, ea...
Seyyedmohsen Azizi, Mani M. Tousi, Kash Khorasani
CSE
2009
IEEE
14 years 5 months ago
Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem
Abstract: Nowadays, it has become common to equip a device with Bluetooth. As such devices become pervasive in the world; much work has been done on forming them into a network, ho...
Yanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhan...
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
14 years 5 months ago
Enabling concurrent clock and power gating in an industrial design flow
— Clock-gating and power-gating have proven to be very effective solutions for reducing dynamic and static power, respectively. The two techniques may be coupled in such a way th...
Leticia Maria Veiras Bolzani, Andrea Calimera, Alb...