Sciweavers

796 search results - page 37 / 160
» Spoofing prevention method
Sort
View
CVPR
2004
IEEE
14 years 12 months ago
Efficient Search of Faces from Complex Line Drawings
Single 2D line drawing is a straightforward method to illustrate 3D objects. The faces of an object depicted by a line drawing give very useful information for the reconstruction ...
Jianzhuang Liu, Xiaoou Tang
ADC
2009
Springer
151views Database» more  ADC 2009»
14 years 1 months ago
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution
Radio Frequency Identification (RFID) technology uses radio-frequency waves to automatically identify people or objects. A large volume of data, resulting from the fast capturing ...
Prapassara Pupunwiwat, Bela Stantic
SEMWEB
2009
Springer
14 years 4 months ago
Policy-Aware Content Reuse on the Web
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research d...
Oshani Seneviratne, Lalana Kagal, Tim Berners-Lee
ICNSC
2007
IEEE
14 years 4 months ago
A Smart Vision Sensor for Detecting Risk Factors of a Toddler's Fall in a Home Environment
This paper presents a smart vision sensor for environmental hazards (such as slippery surfaces) and detecting risk factors of a toddler's fall in an indoor home perilous activ...
Hana Na, Sheng Feng Qin, David Wright
MSWIM
2005
ACM
14 years 3 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...