Sciweavers

Share
SAINT
2008
IEEE
8 years 9 months ago
Detection of Pedestrians Using Subtraction Stereo
Abstract— In this paper, detection of pedestrians using “subtraction stereo” is discussed. Subtraction stereo is a stereo vision method that focuses on the movement of object...
Yuki Hashimoto, Yusuke Matsuki, Tatsuya Nakanishi,...
SAINT
2008
IEEE
8 years 9 months ago
Analysis of a Self-Organizing Maintenance Algorithm under Constant Churn
An increasing proportion of distributed hash tables (DHTs) maintain additional routing information regarding each node’s immediately surrounding neighbors in a network overlay. ...
Richard Price, Tien Tuan Anh Dinh, Georgios K. The...
SAINT
2008
IEEE
8 years 9 months ago
Managing Heterogeneous Data Flows in Wireless Sensor Networks Using a "Split Personality" Mote Platform
Remote sensing applications are increasingly making use of sensors that generate demanding data flows (e.g. digital imaging devices). This paper presents the
Danny Hughes, Mickaël Daudé, Geoff Cou...
SAINT
2008
IEEE
8 years 9 months ago
inContext: A Pervasive and Collaborative Working Environment for Emerging Team Forms
The way people collaborate has been changed substantially. Team members are now belonging to different organizations, working on multiple objectives at the same time, frequently c...
Hong Linh Truong, Schahram Dustdar, Dino Baggio, S...
SAINT
2008
IEEE
8 years 9 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
SAINT
2008
IEEE
8 years 9 months ago
Matrix Routing -- An Interference Range Insensitive Routing Protocol for Wireless Sensor Networks
Interference ranges can dramatically affect the throughput in wireless sensor networks. While the transmission range defines the maximum physical range of a radio signal the inter...
Monty Beuster, Michael Beigl, Daniel Röhr, Ti...
SAINT
2008
IEEE
8 years 9 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
SAINT
2008
IEEE
8 years 9 months ago
Accuracy-Based Cache Consistency Management for Numerical Object Replication
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
Hideya Ochiai, Hiroshi Esaki
SAINT
2008
IEEE
8 years 9 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
SAINT
2008
IEEE
8 years 9 months ago
Novel Energy Harvesting Technologies for ICT Applications
In this paper an overview of novel scavenging approaches for almost autonomous ICT applications will be discussed and evaluated in terms of efficiency, integrability, cost and app...
Manos M. Tentzeris, Yoshihiro Kawahara
books