Sciweavers

3887 search results - page 712 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
16 years 29 days ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
ETFA
2008
IEEE
15 years 10 months ago
CoReDac: Collision-free command-response data collection
Most of the existing sensor network deployments are convergecast data collection applications that transmit data from multiple sources to a sink. In this paper, we present CoReDac...
Thiemo Voigt, Fredrik Österlind
SUTC
2006
IEEE
15 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
EUSFLAT
2001
125views Fuzzy Logic» more  EUSFLAT 2001»
15 years 5 months ago
Computational intelligence approaches for parametric estimation and feature extraction of power spectral density
This paper reports an early progress of a feasibility study of a computational intelligence approach to the enhancement of the accuracy of flow measurements in the framework of a ...
Da Ruan, Davide Roverso, Paolo F. Fantoni
PAMI
2007
157views more  PAMI 2007»
15 years 3 months ago
Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
—Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (p...
Anil K. Jain, Yi Chen, Meltem Demirkus