Sciweavers

598 search results - page 75 / 120
» Conditional Sensor Deployment Using Evolutionary Algorithms
Sort
View
MEDIAFORENSICS
2010
13 years 9 months ago
Managing a large database of camera fingerprints
Sensor fingerprint is a unique noise-like pattern caused by slightly varying pixel dimensions and inhomogeneity of the silicon wafer from which the sensor is made. The fingerprint...
Miroslav Goljan, Jessica J. Fridrich, Tomás...
WINET
2010
224views more  WINET 2010»
13 years 6 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
SENSYS
2010
ACM
13 years 5 months ago
Efficient diagnostic tracing for wireless sensor networks
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
14 years 9 months ago
Scrutinizing Frequent Pattern Discovery Performance
Benchmarking technical solutions is as important as the solutions themselves. Yet many fields still lack any type of rigorous evaluation. Performance benchmarking has always been ...
Mohammad El-Hajj, Osmar R. Zaïane, Stella Luk...
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
14 years 1 months ago
Large Scale Simulation of Tor:
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...
Gavin O'Gorman, Stephen Blott