Sciweavers

4744 search results - page 929 / 949
» Connected Computing
Sort
View
CCS
2010
ACM
13 years 9 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
DOCENG
2010
ACM
13 years 8 months ago
Next generation typeface representations: revisiting parametric fonts
Outline font technology has long been established as the standard way to represent typefaces, allowing characters to be represented independently of print size and resolution. Alt...
Tamir Hassan, Changyuan Hu, Roger D. Hersch
MM
2010
ACM
121views Multimedia» more  MM 2010»
13 years 8 months ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
MM
2010
ACM
151views Multimedia» more  MM 2010»
13 years 8 months ago
Explicit and implicit concept-based video retrieval with bipartite graph propagation model
The major scientific problem for content-based video retrieval is the semantic gap. Generally speaking, there are two appropriate ways to bridge the semantic gap: the first one is...
Lei Bao, Juan Cao, Yongdong Zhang, Jintao Li, Ming...
MOBICOM
2010
ACM
13 years 8 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...