• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,642
Next 10 →

Earthquake Shakes Twitter Users: Real-time Event Detection by Social Sensors

by Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo - In Proceedings of the Nineteenth International WWW Conference (WWW2010). ACM , 2010
"... Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occurs, people make many Twitter posts (tweets) related to the earthquake, which enables detection of earthquake occurrence ..."
Abstract - Cited by 524 (4 self) - Add to MetaCart
promptly, simply by observing the tweets. As described in this paper, we investigate the real-time interaction of events such as earthquakes, in Twitter, and propose an algorithm to monitor tweets and to detect a target event. To detect a target event, we devise a classifier of tweets based on features

Data mules: Modeling a three-tier architecture for sparse sensor networks

by Rahul C. Shah, Sumit Roy, Sushant Jain, Waylon Brunette - IN IEEE SNPA WORKSHOP , 2003
"... Abstract — This paper presents and analyzes an architecture that exploits the serendipitous movement of mobile agents in an environment to collect sensor data in sparse sensor networks. The mobile entities, called MULEs, pick up data from sensors when in close range, buffer it, and drop off the data ..."
Abstract - Cited by 485 (6 self) - Add to MetaCart
and access points. The performance metrics observed are the data success rate (the fraction of generated data that reaches the access points) and the required buffer capacities on the sensors and the MULEs. The modeling along with simulation results can be used for further analysis and provide certain

Spatial and Temporal Resolution of Sensor Observations

by unknown authors
"... Spatial and temporal resolution are intrinsic to any sensor observation and should be made explicit in a data sharing context. The goal of this work is to develop a theory of spatial and temporal resolution of sensor observations. The theory will be formally specified in Haskell and implemented in l ..."
Abstract - Add to MetaCart
Spatial and temporal resolution are intrinsic to any sensor observation and should be made explicit in a data sharing context. The goal of this work is to develop a theory of spatial and temporal resolution of sensor observations. The theory will be formally specified in Haskell and implemented

FastSLAM: A Factored Solution to the Simultaneous Localization and Mapping Problem

by Michael Montemerlo, Sebastian Thrun, Daphne Koller, Ben Wegbreit - In Proceedings of the AAAI National Conference on Artificial Intelligence , 2002
"... The ability to simultaneously localize a robot and accurately map its surroundings is considered by many to be a key prerequisite of truly autonomous robots. However, few approaches to this problem scale up to handle the very large number of landmarks present in real environments. Kalman filter-base ..."
Abstract - Cited by 599 (10 self) - Add to MetaCart
-based algorithms, for example, require time quadratic in the number of landmarks to incorporate each sensor observation. This paper presents FastSLAM, an algorithm that recursively estimates the full posterior distribution over robot pose and landmark locations, yet scales logarithmically with the number

LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks

by Sencun Zhu , 2003
"... Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observ ..."
Abstract - Cited by 469 (22 self) - Add to MetaCart
by the observation that different types of messages exchanged between sensor nodes have different security requirements, and that a single keying mechanism is not suitable for meeting these different security requirements. LEAP supports the establishment of four types of keys for each sensor node – an individual key

Sources through Sensor Observations

by A. V. Kryazhimskii, V. I. Maksimov, Yu. S. Osipov, A. V. Kryazhimskii, V. I. Maksimov, Yu. S. Osipov, A. V. Kryazhimskii, V. I. Maksimov , 1996
"... Working Papers are interim reports on work of the International Institute for Applied Systems Analysis and have received only limited review. Views or opinions expressed herein do not necessarily represent those of the Institute, its National Member Organizations, or other organizations supporting t ..."
Abstract - Add to MetaCart
Working Papers are interim reports on work of the International Institute for Applied Systems Analysis and have received only limited review. Views or opinions expressed herein do not necessarily represent those of the Institute, its National Member Organizations, or other organizations supporting the work. IIASA International

The semantics of sensor observations based on attention

by Christoph Stascha
"... Increasingly large amounts of data are being generated by technical sensors dis-tributed in the human environment. However, a naked sensor value alone is meaningless. It lacks crucial meta-information, including the support and spatio-temporal resolution, and more generally the observation and inter ..."
Abstract - Add to MetaCart
Increasingly large amounts of data are being generated by technical sensors dis-tributed in the human environment. However, a naked sensor value alone is meaningless. It lacks crucial meta-information, including the support and spatio-temporal resolution, and more generally the observation

A New Location Technique for the Active Office

by Andy Ward, Alan Jones , 1997
"... Configuration of the computing and communications systems found at home and in the workplace is a complex task that currently requires the attention of the user. Recently, researchers have begun to examine computers that would autonomously change their functionality based on observations of who or ..."
Abstract - Cited by 515 (4 self) - Add to MetaCart
Configuration of the computing and communications systems found at home and in the workplace is a complex task that currently requires the attention of the user. Recently, researchers have begun to examine computers that would autonomously change their functionality based on observations of who

Blind Signal Separation: Statistical Principles

by Jean-Francois Cardoso , 2003
"... Blind signal separation (BSS) and independent component analysis (ICA) are emerging techniques of array processing and data analysis, aiming at recovering unobserved signals or `sources' from observed mixtures (typically, the output of an array of sensors), exploiting only the assumption of mut ..."
Abstract - Cited by 529 (4 self) - Add to MetaCart
Blind signal separation (BSS) and independent component analysis (ICA) are emerging techniques of array processing and data analysis, aiming at recovering unobserved signals or `sources' from observed mixtures (typically, the output of an array of sensors), exploiting only the assumption

Cognitive networks

by Ryan W. Thomas, Luiz A. DaSilva, Allen B. MacKenzie - IN PROC. OF IEEE DYSPAN 2005 , 2005
"... This paper presents a definition and framework for a novel type of adaptive data network: the cognitive network. In a cognitive network, the collection of elements that make up the network observes network conditions and then, using prior knowledge gained from previous interactions with the network ..."
Abstract - Cited by 1106 (7 self) - Add to MetaCart
This paper presents a definition and framework for a novel type of adaptive data network: the cognitive network. In a cognitive network, the collection of elements that make up the network observes network conditions and then, using prior knowledge gained from previous interactions
Next 10 →
Results 1 - 10 of 10,642
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University