User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
—In this paper, an information grouping paradigm for QoI in sensor networks is introduced. First, a definition of QoI is presented by analyzing the ITU’s definition of QoS. T...
Chatschik Bisdikian, Joel W. Branch, Kin K. Leung,...
Many problems in computer vision can be modeled using
conditional Markov random fields (CRF). Since finding
the maximum a posteriori (MAP) solution in such models
is NP-hard, mu...
Stephen Gould (Stanford University), Fernando Amat...
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...