Sciweavers

796 search results - page 42 / 160
» Spoofing prevention method
Sort
View
ICC
2007
IEEE
14 years 4 months ago
Locating Congested Segments on the Internet by Clustering the Delay Performance of Multiple Paths
— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
PERVASIVE
2007
Springer
14 years 4 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ACCV
2006
Springer
14 years 3 months ago
Minimal Weighted Local Variance as Edge Detector for Active Contour Models
Performing segmentation of narrow, elongated structures with low contrast boundaries is a challenging problem. Boundaries of these structures are difficult to be located when noise...
Max W. K. Law, Albert C. S. Chung
AVSS
2005
IEEE
14 years 3 months ago
Shape recognition based on a video and multi-sensor system
We present in this paper a real-time system for shape recognition. The proposed system is a video and multisensor platform that is able to classify the mobile objects evolving in ...
Huy-Binh Bui Ngoc, François Brémond,...
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 3 months ago
Identifying Transformer Incipient Events for Maintaining Distribution System Reliability
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
Karen L. Butler-Purry, Mustafa Bagriyanik