Sciweavers

1416 search results - page 210 / 284
» cost 2009
Sort
View
AINA
2009
IEEE
13 years 6 months ago
Approximating Travel Times Using Opportunistic Networking
Determining the time and means by which to travel from location A to location B for a person utilising a MANET requires the dissemination of both realtime and historic data. In thi...
Rudi Ball, Naranker Dulay
AVSS
2009
IEEE
13 years 6 months ago
Counting People in Groups
Abstract--Cameras are becoming a common tool for automated vision purposes due to their low cost. In an era of growing security concerns, camera surveillance systems have become no...
Duc Fehr, Ravishankar Sivalingam, Vassilios Morell...
CCS
2009
ACM
13 years 6 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
DAGM
2009
Springer
13 years 6 months ago
HMM-Based Defect Localization in Wire Ropes - A New Approach to Unusual Subsequence Recognition
Abstract. Automatic visual inspection has become an important application of pattern recognition, as it supports the human in this demanding and often dangerous work. Nevertheless,...
Esther-Sabrina Platzer, Josef Nägele, Karl-He...