Sciweavers

861 search results - page 148 / 173
» Detecting cuts in sensor networks
Sort
View
126
Voted
DCOSS
2006
Springer
15 years 7 months ago
The Virtual Pheromone Communication Primitive
We propose a generic communication primitive designed for sensor networks. Our primitive hides details of network communication while retaining sufficient programmer control over t...
Leo Szumel, John D. Owens
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 10 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
88
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
A Rotate-based Best Neighborhood Matching Algorithm for High Definition Image Error Concealment
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
Liqiang He, Yanyan Zhang
142
Voted
JCST
2010
119views more  JCST 2010»
15 years 2 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
KI
2007
Springer
15 years 9 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signi...
Dieter Fox