Sciweavers

2358 search results - page 378 / 472
» A Secure Pervasive Environment
Sort
View
SRDS
2008
IEEE
15 years 10 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
AVSS
2007
IEEE
15 years 10 months ago
2D face pose normalisation using a 3D morphable model
The ever growing need for improved security, surveillance and identity protection, calls for the creation of evermore reliable and robust face recognition technology that is scala...
Jose Rafael Tena, Raymond S. Smith, Miroslav Hamou...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 10 months ago
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Krishna K. Ramachandran, Biplab Sikdar
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 10 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
ICDCS
2007
IEEE
15 years 10 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu