Sciweavers

42 search results - page 5 / 9
» A Verifiable and Detectable Secret Sharing Scheme by Using a...
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
ICRA
2010
IEEE
226views Robotics» more  ICRA 2010»
13 years 6 months ago
Indoor scene recognition through object detection
Abstract— Scene recognition is a highly valuable perceptual ability for an indoor mobile robot, however, current approaches for scene recognition present a significant drop in p...
Pablo Espinace, Thomas Kollar, Alvaro Soto, Nichol...
JCST
2010
109views more  JCST 2010»
13 years 2 months ago
Feature Preserving Mesh Simplification Using Feature Sensitive Metric
We present a new method for feature preserving mesh simplification based on feature sensitive (FS) metric. Previous quadric error based approach is extended to a high-dimensional F...
Jin Wei, Yu Lou
CVPR
2009
IEEE
14 years 2 months ago
Disambiguating the recognition of 3D objects
We propose novel algorithms for the detection, segmentation, recognition, and pose estimation of threedimensional objects. Our approach initially infers geometric primitives to de...
Gutemberg Guerra-Filho