Sciweavers

66 search results - page 8 / 14
» Secure Location Verification Using Radio Broadcast
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
A top-down auditory attention model for learning task dependent influences on prominence detection in speech
A top-down task-dependent model guides attention to likely target locations in cluttered scenes. Here, a novel biologically plausible top-down auditory attention model is presente...
Ozlem Kalinli, Shrikanth S. Narayanan
MOBIWAC
2006
ACM
14 years 1 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...
TPDS
2008
157views more  TPDS 2008»
13 years 7 months ago
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks
The localization of sensor nodes is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can acquire...
Bin Xiao, Hekang Chen, Shuigeng Zhou
JMM2
2006
151views more  JMM2 2006»
13 years 7 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
ICCSA
2005
Springer
14 years 1 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...