Sciweavers

3674 search results - page 239 / 735
» Information Dependencies
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 5 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
CCS
2007
ACM
14 years 4 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
VC
2008
66views more  VC 2008»
13 years 10 months ago
Services surround you
Our daily life is pervaded by digital information and devices, not least the common mobile phone. However, a seamless connection between our physical world, such as a movie trailer...
Niels Henze, René Reiners, Xavier Righetti,...
SWAP
2008
14 years 2 days ago
Building Web Annotation Stickies based on Bidirectional Links
Abstract. We propose a web annotation system which adds the functionality of stickies to web pages and creates bidirectional links between the stickies. The stickies allow for impo...
Hiroyuki Sano, Taiki Ito, Tadachika Ozono, Toramat...
ICASSP
2010
IEEE
13 years 10 months ago
Hierarchical language modeling for audio events detection in a sports game
We investigate the automatic labelling of “events” from an audio recording of a sports game. We describe a technique that utilises a hierarchy of language models, which are a ...
Qiang Huang, Stephen Cox