Sciweavers

AINA
2007
IEEE
14 years 3 months ago
Speaker Tracking and Identifying Based on Indoor Localization System and Microphone Array
This paper presents a novel multimodal system to track the participants and identify the active speaker in the smart meeting room. Indoor localization system, Cicada, is used to o...
Xiaojie Chen, Yuanchun Shi, Wenfeng Jiang
AINA
2007
IEEE
14 years 3 months ago
Reference Path Ad Hoc Routing Mechanism
The purpose of this work is to present the Reference Path Ad hoc Routing (REPAR) mechanism, which has been designed to optimize the performance of reactive ad hoc routing protocol...
Fabricio L. Figueiredo, Paulo Cardieri, Marcel C. ...
AINA
2007
IEEE
14 years 3 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
AINA
2007
IEEE
14 years 3 months ago
Fuzzy Logic-Based Event Notification in Sparse MANETs
In the Ad-Hoc InfoWare project, we develop a delay tolerant event notification service for sparse Mobile Ad-Hoc Networks for emergency and rescue operations. In most event notific...
Anna K. Lekova, Katrine Stemland Skjelsvik, Thomas...
AINA
2007
IEEE
14 years 3 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
AINA
2007
IEEE
14 years 3 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
AINA
2007
IEEE
14 years 3 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
AINA
2007
IEEE
14 years 3 months ago
Mining Visual Knowledge for Multi-Lingual Image Retrieval
Users commonly rely just on scarce textual annotation when their searches for images are semantic or conceptual based. Rich visual information is often thrown away in basic annota...
Masashi Inoue
AINA
2007
IEEE
14 years 3 months ago
A Semi-Automatic Framework for Mining ERP Patterns
Event-related potentials (ERP) are brain electrophysiological patterns created by averaging electroencephalographic (EEG) data, time-locking to events of interest (e.g., stimulus ...
Jiawei Rong, Dejing Dou, Gwen A. Frishkoff, Robert...