Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
Our daily life is pervaded by digital information and devices, not least the common mobile phone. However, a seamless connection between our physical world, such as a movie trailer...
Abstract. We propose a web annotation system which adds the functionality of stickies to web pages and creates bidirectional links between the stickies. The stickies allow for impo...
We investigate the automatic labelling of “events” from an audio recording of a sports game. We describe a technique that utilises a hierarchy of language models, which are a ...