Sciweavers

485 search results - page 27 / 97
» Continuous Spatial Authentication
Sort
View
ICDE
2006
IEEE
186views Database» more  ICDE 2006»
14 years 9 months ago
Energy-Efficient Continuous Isoline Queries in Sensor Networks
Environmental monitoring is a promising application for sensor networks. Many scenarios produce geographically correlated readings, making them visually interesting and good targe...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
CIARP
2007
Springer
14 years 1 months ago
A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics
Underlying biometrics are biological tissues that evolve over time. Hence, biometric authentication (and recognition in general) is a dynamic pattern recognition problem. We propos...
Norman Poh, Josef Kittler, Raymond S. Smith, Jose ...
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
13 years 6 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
DASFAA
2007
IEEE
190views Database» more  DASFAA 2007»
14 years 2 months ago
Clustering Moving Objects in Spatial Networks
Advances in wireless networks and positioning technologies (e.g., GPS) have enabled new data management applications that monitor moving objects. In such new applications, realtime...
Jidong Chen, Caifeng Lai, Xiaofeng Meng, Jianliang...
ACMSE
2008
ACM
13 years 9 months ago
A study of the performance of steering tasks under spatial transformation of input
Indirection exists between the virtual objects that form the computer interface and the input devices through which the user interacts to manipulate these objects. This paper stud...
Mihail Eduard Tudoreanu, Eileen Kraemer