Sciweavers

9231 search results - page 1631 / 1847
» informs 2008
Sort
View
MVA
2008
15 years 4 months ago
Retrieving articulated 3-D models using medial surfaces
Abstract We consider the use of medial surfaces to represent symmetries of 3-D objects. This allows for a qualitative abstraction based on a directed acyclic graph of components an...
Kaleem Siddiqi, Juan Zhang, Diego Macrini, Ali Sho...
PE
2008
Springer
89views Optimization» more  PE 2008»
15 years 4 months ago
Merging and splitting autocorrelated arrival processes and impact on queueing performance
We have proposed a three-parameter renewal approximation to analyze splitting and superposition of autocorrelated processes. We define the index of dispersion for counts of an ord...
Baris Balcioglu, David L. Jagerman, Tayfur Altiok
PERCOM
2008
ACM
15 years 4 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
PERVASIVE
2008
Springer
15 years 4 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 4 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
« Prev « First page 1631 / 1847 Last » Next »