Sciweavers

1414 search results - page 20 / 283
» Combining Intruder Theories
Sort
View
MOBICOM
2005
ACM
14 years 3 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
MOBIHOC
2010
ACM
13 years 7 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
14 years 2 months ago
Information Fusion in Biometrics
User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric tra...
Arun Ross, Anil K. Jain, Jian Zhong Qian
CADE
2003
Springer
14 years 10 months ago
Canonization for Disjoint Unions of Theories
If there exist efficient procedures (canonizers) for reducing terms of two first-order theories to canonical form, can one use them to construct such a procedure for terms of the d...
Sava Krstic, Sylvain Conchon
IAT
2008
IEEE
14 years 4 months ago
A Computer Simulation Laboratory for Social Theories
  We   present   an   agent­based   model   that   employs  different   social   theories   and   their   combination   to  explain and predict social changes....
Joseph M. Whitmeyer, Moutaz Khouja, Ted Carmichael...