Sciweavers

115 search results - page 9 / 23
» Watching Systems in graphs: an extension of Identifying Code...
Sort
View
CORR
2006
Springer
79views Education» more  CORR 2006»
13 years 9 months ago
Source coding and channel requirements for unstable processes
Our understanding of information in systems has been based on the foundation of memoryless processes. Extensions to stable Markov and auto-regressive processes are classical. Berg...
Anant Sahai, Sanjoy K. Mitter
INFOCOM
2009
IEEE
14 years 4 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
APSEC
2003
IEEE
14 years 3 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
ETRA
2006
ACM
198views Biometrics» more  ETRA 2006»
14 years 3 months ago
Perceptual attention focus prediction for multiple viewers in case of multimedia perceptual compression with feedback delay
Human eyes have limited perception capabilities. Only 2 degrees of our 180 degree vision field provide the highest quality of perception. Due to this fact the idea of perceptual a...
Oleg Komogortsev, Javed I. Khan
MOBICOM
2012
ACM
12 years 7 days ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...