Search
Now showing items 21-29 of 29
Fast And Energy-efficient Technique For Jammed Region Mapping In Wireless Sensor Networks
(Computer Science & Engineering, 2010-11-01)
Wireless sensor networks (WSNs) have great practical importance for surveillance systems to perform monitoring by acquiring and sending information about intrusions into a secured area. Very little human intervention is ...
Detecting Medication Consumption Patterns In Assistive Environments
(Computer Science & Engineering, 2010-11-01)
One of the issues in healthcare systems or medical information systems is the reduction of medical errors to ensure patient safety. Our approach is to develop a cyber physical system which applies different RFID tags to ...
Event Recognition From Ambient Assistive Living Technologies
(Computer Science & Engineering, 2010-11-01)
As the population ages and technology advances, a need exists for creating ambient intelligent systems to be placed within the home environment. Attitudes towards technology have been changing, and home monitoring is now ...
A Comparison And Evaluation Of Motion Indexing Techniques
(Computer Science & Engineering, 2010-11-01)
Motion capture (mocap) is a way to digitally represent the spatio-temporalstructure of human movement. Human motion is generally captured in long sequences to record the natural and complex aspects of human actions, its ...
High Performance Real-time Embedded Systems: Design And Implementation Of Road Surface Analyzer System
(Computer Science & Engineering, 2010-07-19)
Multi-core processors are becoming main components for many embedded systems. Designing such embedded systems is a complex task, since developers must deal with a number of issues such as multi-threading and optimal use ...
Enhancing Personalized Search And Improving Accuracy And Performance For Keyword-based XML Queries
(Computer Science & Engineering, 2010-07-19)
This dissertation research focuses on three aspects related to querying of XML data. The three focus areas are: (1) Improving accuracy of XML keyword queries by modeling the contexts of XML elements; (2) Enhancing XML-based ...
Mimic: An Active Covert Channel That Evades Regularity-based Detection
(Computer Science & Engineering, 2010-07-19)
A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ...
Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2010-07-19)
A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been ...
Branch-and-Bound for Model Selection and its Computational Complexity
(IEEE Xplore, 2010-09-02)
Branch-and-bound methods are used in various data analysis problems such as clustering, seriation
and feature selection. Classical approaches of branch-and-bound based clustering search through combinations
of various ...