Sciweavers

65 search results - page 10 / 13
» On Computing Farthest Dominated Locations
Sort
View
ICIAP
2001
Springer
14 years 7 months ago
Wavelet-Based Texture Segmentation of Remotely Sensed Images
In this article a texturefeature extraction scheme based on M-band waveletpacketframes is investigated. Thefeatures so extracted are usedfor segmentation of satellite images which...
Mausumi Acharyya, Malay K. Kundu
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
CHI
2011
ACM
12 years 11 months ago
Your noise is my command: sensing gestures using the body as an antenna
Touch sensing and computer vision have made humancomputer interaction possible in environments where keyboards, mice, or other handheld implements are not available or desirable. ...
Gabe Cohn, Daniel Morris, Shwetak N. Patel, Desney...
INFOCOM
2006
IEEE
14 years 1 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
AINA
2010
IEEE
14 years 17 days ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...