Sciweavers

998 search results - page 101 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
WISEC
2009
ACM
14 years 3 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
ICN
2009
Springer
14 years 3 months ago
An Automotive Security System for Anti-theft
— Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system t...
Huaqun Guo, H. S. Cheng, Yong Dong Wu, J. J. Ang, ...
CVPR
2008
IEEE
14 years 3 months ago
Unified Principal Component Analysis with generalized Covariance Matrix for face recognition
Recently, 2DPCA and its variants have attracted much attention in face recognition area. In this paper, some efforts are made to discover the underlying fundaments of these method...
Shiguang Shan, Bo Cao, Yu Su, Laiyun Qing, Xilin C...
ICDCS
2008
IEEE
14 years 3 months ago
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living
Advances in networking, sensors, medical devices and smart phones have made it feasible to monitor and provide medical and other assistance to people either in their homes or outs...
Zheng Zeng, S. Yu, Wook Shin, Jennifer C. Hou
ICPR
2008
IEEE
14 years 3 months ago
Applying similarity metrics to 3D acquisition in structured-light systems
Structured light systems use projected light to augment a scene with extra information. The goal of such systems is often the recovery of depth information based on 2D image(s) fr...
Graylin T. Jay, Randy Smith