Sciweavers

644 search results - page 103 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ICPR
2006
IEEE
16 years 27 days ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...
MSWIM
2009
ACM
15 years 6 months ago
Medium access control for underwater acoustic sensor networks with MIMO links
The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this artic...
Li-Chung Kuo, Tommaso Melodia
MONET
2011
14 years 2 months ago
Distributed Coalition Formation Games for Secure Wireless Transmission
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
AGENTS
2001
Springer
15 years 4 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
HCI
2009
14 years 9 months ago
Identifying Proper Scales on Digital Maps for In-Vehicle Navigation Systems
Abstract. Current commercial mobile navigation systems often use a predetermined scale selection schema without considering differences in spatial complexity of locations. To ident...
Anna Wu, Xiaolong Zhang