Sciweavers

275 search results - page 14 / 55
» Localization from Incomplete Noisy Distance Measurements
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 2 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 2 months ago
Range-based Mobility Estimations in MANETs with Application to Link Availability Prediction
— The quality of communications in mobile ad-hoc networks is largely determined by the topological stability. Characterizing the mobility of mobile nodes (e.g. how often they mov...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
ICPR
2000
IEEE
14 years 8 months ago
A Comparative Study of Filter Based Texture Operators Using Mahalanobis Distance
Texture feature extraction operators, which comprise linear filtering, eventually followed by post-processing, are considered. The filters used are Laws' masks, filters deriv...
Simona E. Grigorescu, Nicolai Petkov, Peter Kruizi...
INFOCOM
2010
IEEE
13 years 6 months ago
Towards Mobile Phone Localization without War-Driving
Abstract—This paper identifies the possibility of using electronic compasses and accelerometers in mobile phones, as a simple and scalable method of localization without war-dri...
Ionut Constandache, Romit Roy Choudhury, Injong Rh...
ICASSP
2009
IEEE
14 years 2 months ago
Field inversion by consensus and compressed sensing
— We study the inversion of a random field from pointwise measurements collected by a sensor network. We assume that the field has a sparse representation in a known basis. To ...
Aurora Schmidt, José M. F. Moura