Sciweavers

418 search results - page 52 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Electronic Chronicles: Empowering Individuals, Groups, and Organizations
Continuing strides in processing, storage, sensing, and networking technologies are enabling people to capture their activities and experiences as greater volumes of ever-richer m...
Gopal Pingali, R. Jain
ICPR
2000
IEEE
14 years 9 months ago
Visual Extraction of Motion-Based Information from Image Sequences
We describe a system which is designed to assist in extracting high-level information from sets or sequences of images. We show that the method of principal components analysis fo...
David P. Gibson, Neill W. Campbell, Colin J. Dalto...
MOBICOM
2005
ACM
14 years 1 months ago
Using mobile relays to prolong the lifetime of wireless sensor networks
In this paper we investigate the benefits of a heterogeneous architecture for wireless sensor networks composed of a few resource rich mobile nodes and a large number of simple s...
Wei Wang 0002, Vikram Srinivasan, Kee Chaing Chua
JCDL
2010
ACM
187views Education» more  JCDL 2010»
13 years 10 months ago
Social network document ranking
In search engines, ranking algorithms measure the importance and relevance of documents mainly based on the contents and relationships between documents. User attributes are usual...
Liang Gou, Xiaolong Zhang, Hung-Hsuan Chen, Jung-H...
SAC
2009
ACM
14 years 2 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...