Sciweavers

201 search results - page 15 / 41
» A Linear-System Operator Based Scheme for Evaluation of Mult...
Sort
View
WINET
2010
179views more  WINET 2010»
13 years 5 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ICASSP
2011
IEEE
12 years 11 months ago
An adaptive bayesian clustering and multivariate region merging based technique for efficient segmentation of color images
We propose a methodology for improved segmentation of images in a Bayesian framework by fusion of color, texture and gradient information. The proposed algorithm is initialized by...
Sreenath Rao Vantaram, Eli Saber
ICIP
2007
IEEE
14 years 1 months ago
Lifting-Based Directional DCT-Like Transform for Image Coding
Traditional 2D DCT implemented by separable 1D transform in horizontal and vertical directions does not take image orientation features in a local window into account. To improve ...
Hao Xu, Jizheng Xu, Feng Wu
TMC
2008
90views more  TMC 2008»
13 years 7 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
DEXAW
2003
IEEE
128views Database» more  DEXAW 2003»
14 years 25 days ago
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
Key Pousttchi, Mario Zenker