Sciweavers

1747 search results - page 298 / 350
» Location, Localization, and Localizability
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 11 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
PAMI
2006
107views more  PAMI 2006»
13 years 11 months ago
Robust Pose Estimation from a Planar Target
In theory, the pose of a calibrated camera can be uniquely determined from a minimum of four coplanar but noncollinear points. In practice, there are many applications of camera po...
Gerald Schweighofer, Axel Pinz
RAS
2006
86views more  RAS 2006»
13 years 11 months ago
Using cellular automata and gradients to control self-reconfiguration
Self-reconfigurable robots are built from modules, which are autonomously able to change the way they are connected. Such a robot can, through this self-reconfiguration process, c...
Kasper Støy
IJCV
2007
146views more  IJCV 2007»
13 years 11 months ago
Statistical Multi-Object Shape Models
The shape of a population of geometric entities is characterized by both the common geometry of the population and the variability among instances. In the deformable model approach...
Conglin Lu, Stephen M. Pizer, Sarang C. Joshi, Ja-...
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 11 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...