Sciweavers

CSE
2009
IEEE
14 years 6 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
CSE
2009
IEEE
14 years 6 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
CSE
2009
IEEE
14 years 6 months ago
Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks
Seung-Ku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong H...
CSE
2009
IEEE
14 years 6 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
CSE
2009
IEEE
14 years 6 months ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
CSE
2009
IEEE
14 years 6 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
CSE
2009
IEEE
14 years 6 months ago
Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map
Fast fusion of multiple registered out-of-focus images is of great interest in medical imaging; for example, the thoracic cavity is always too bumpy to be focused on all parts at ...
Hongbo Zhou, Qiang Cheng, Mehdi Zargham
CSE
2009
IEEE
14 years 6 months ago
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML
1 Mobile sensor nodes should be well deployed so that they maximize the area coverage with the constraint that each node has at least K neighbours, where K is a userspecified para...
Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-He...
CSE
2009
IEEE
14 years 6 months ago
Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions
—In professional tennis training matches, the coach needs to be able to view play from the most appropriate angle in order to monitor players activities. In this paper, we presen...
Richard Tynan, Anthony Schoofs, Conor Muldoon, Gre...