Sciweavers

7961 search results - page 1438 / 1593
» Data Integration with Uncertainty
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 5 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
MONET
2011
13 years 5 months ago
On Adaptive Density Deployment to Mitigate the Sink-Hole Problem in Mobile Sensor Networks
Abstract The use of mobile sensors is of great relevance to monitor critical areas where sensors cannot be deployed manually. The presence of data collector sinks causes increased ...
Novella Bartolini, Tiziana Calamoneri, Annalisa Ma...
PAMI
2011
13 years 5 months ago
Overcoming Shadows in 3-Source Photometric Stereo
—Light occlusions are one of the most significant difficulties of photometric stereo methods. When three or more images are available without occlusion, the local surface orien...
Carlos Hernández, George Vogiatzis, Roberto...
TDSC
2011
13 years 5 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
WWW
2011
ACM
13 years 5 months ago
Generalized fact-finding
Once information retrieval has located a document, and information extraction has provided its contents, how do we know whether we should actually believe it? Fact-finders are a ...
Jeff Pasternack, Dan Roth
« Prev « First page 1438 / 1593 Last » Next »