Sciweavers

368 search results - page 57 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
WCNC
2008
IEEE
14 years 1 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
DKE
2008
72views more  DKE 2008»
13 years 7 months ago
On space constrained set selection problems
Space constrained optimization problems arise in a variety of applications, ranging from databases to ubiquitous computing. Typically, these problems involve selecting a set of it...
Themis Palpanas, Nick Koudas, Alberto O. Mendelzon
ICPR
2008
IEEE
14 years 1 months ago
Model-based combined tracking and resolution enhancement
Wide area surveillance requires high-resolution images of the object of interest derived possibly from only low-resolution video of the whole scene. We propose a combined tracking...
Annika Kuhl, Tele Tan, Svetha Venkatesh
GI
2009
Springer
13 years 5 months ago
An Improved Method for creating Shared Belief in Communication Constrained Sensor Networks
: Networked systems that gather sensor data in order to react to phenomena in their surroundings are faced with a growing need for adaptive behavior to operate in dynamically chang...
Eelke van Foeken, Peter Hiemstra, Leon Kester
GIS
2009
ACM
14 years 8 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah