Sciweavers

2125 search results - page 162 / 425
» Points with Type-2 Operations
Sort
View
128
Voted
DCOSS
2008
Springer
15 years 5 months ago
LiveNet: Using Passive Monitoring to Reconstruct Sensor Network Dynamics
We describe LiveNet, a set of tools and analysis methods for reconstructing the complex behavior of a deployed sensor network. LiveNet is based on the use of multiple passive packe...
Bor-rong Chen, Geoffrey Peterson, Geoffrey Mainlan...
167
Voted
FLAIRS
2006
15 years 5 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
160
Voted
AUSFORENSICS
2003
15 years 5 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb
93
Voted
SODA
2004
ACM
116views Algorithms» more  SODA 2004»
15 years 5 months ago
Retroactive data structures
We introduce a new data structuring paradigm in which operations can be performed on a data structure not only in the present but also in the past. In this new paradigm, called ret...
Erik D. Demaine, John Iacono, Stefan Langerman
244
Voted
CIMAGING
2009
184views Hardware» more  CIMAGING 2009»
15 years 4 months ago
Fast space-varying convolution and its application in stray light reduction
Space-varying convolution often arises in the modeling or restoration of images captured by optical imaging systems. For example, in applications such as microscopy or photography...
Jianing Wei, Guangzhi Cao, Charles A. Bouman, Jan ...