Search
Now showing items 21-24 of 24
Prominent Streaks Discovery On Blog Articles
(Computer Science & Engineering, 2013-03-20)
We are surrounded by data in various forms such as instant messages, Twitter tweets, Facebook status updates, news, media, blogs and much more. Extracting meaning from such a massive collection of unstructured data would ...
Development Of A Detached Vital Sign Home Monitoring Management System
(Computer Science & Engineering, 2013-03-20)
Patients coping with chronic illnesses are often inconvenienced with routine doctor visits for the sole purpose of conducting basic vital sign monitoring. Such visits tend to be disruptive, and are more so when the patient ...
Dovetail: Stronger Anonymity In Next-generation Internet Routing
(Computer Science & Engineering, 2013-07-22)
Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than this ...
A Novel Scheme For Contact Predictions In Opportunistic Networks
(Computer Science & Engineering, 2013-03-20)
In the opportunistic network (ON) paradigm information is exchanged between two devices as they encounter each other. For such information exchange to take place the devices must know about the presence of other devices ...