Sciweavers

842 search results - page 127 / 169
» Robust intra-document locations
Sort
View
WS
2006
ACM
14 years 3 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
ADHOCNOW
2009
Springer
14 years 4 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...
GECCO
2004
Springer
123views Optimization» more  GECCO 2004»
14 years 3 months ago
Heuristic Methods for Solving Euclidean Non-uniform Steiner Tree Problems
In this paper, we consider a variation of the Euclidean Steiner Tree Problem in which the space underlying the set of nodes has a specified non-uniform cost structure. This proble...
Ian Frommer, Bruce L. Golden, Guruprasad Pundoor
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 3 months ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai
ECCV
2000
Springer
14 years 11 months ago
Model Based Pose Estimator Using Linear-Programming
Given a ? object and some measurements for points in this object, it is desired to find the ? location of the object. A new model based pose estimator from stereo pairs based on l...
Moshe Ben-Ezra, Shmuel Peleg, Michael Werman