Sciweavers

262 search results - page 11 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
PERVASIVE
2006
Springer
13 years 8 months ago
iCam: Precise at-a-Distance Interaction in the Physical Environment
Abstract. Precise indoor localization is quickly becoming a reality, but application demonstrations to date have been limited to use of only a single piece of location information ...
Shwetak N. Patel, Jun Rekimoto, Gregory D. Abowd
CVPR
2009
IEEE
13 years 12 months ago
Nonnegative Matrix Factorization with Earth Mover's Distance metric
Nonnegative Matrix Factorization (NMF) approximates a given data matrix as a product of two low rank nonnegative matrices, usually by minimizing the L2 or the KL distance between ...
Roman Sandler, Michael Lindenbaum
ADHOCNOW
2004
Springer
14 years 1 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
DSN
2007
IEEE
14 years 2 months ago
Reliability Techniques for RFID-Based Object Tracking Applications
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including secur...
Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittw...
CCS
2006
ACM
13 years 11 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang