Sciweavers

77016 search results - page 15392 / 15404
» Modeling
Sort
View
TMC
2012
11 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
TMC
2012
11 years 9 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
EDBT
2012
ACM
247views Database» more  EDBT 2012»
11 years 9 months ago
Heuristics-based query optimisation for SPARQL
Query optimization in RDF Stores is a challenging problem as SPARQL queries typically contain many more joins than equivalent relational plans, and hence lead to a large join orde...
Petros Tsialiamanis, Lefteris Sidirourgos, Irini F...
ESORICS
2012
Springer
11 years 9 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
CVPR
1998
IEEE
14 years 9 months ago
Using Adaptive Tracking to Classify and Monitor Activities in a Site
We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
« Prev « First page 15392 / 15404 Last » Next »