Sciweavers

3941 search results - page 511 / 789
» Computational Efficiency of Batching Methods
Sort
View
175
Voted
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
16 years 22 days ago
Ranking queries on uncertain data: a probabilistic threshold approach
Uncertain data is inherent in a few important applications such as environmental surveillance and mobile object tracking. Top-k queries (also known as ranking queries) are often n...
Ming Hua, Jian Pei, Wenjie Zhang, Xuemin Lin
PERCOM
2007
ACM
16 years 5 days ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
97
Voted
ICDS
2009
IEEE
15 years 7 months ago
A Hybrid Approach for Clustering-Based Data Aggregation in Wireless Sensor Networks
—In a wireless sensor network application for tracking multiple mobile targets, large amounts of sensing data can be generated by a number of sensors. These data must be controll...
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, Sang-Jo...
103
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Distributed compressive video sensing
Low-complexity video encoding has been applicable to several emerging applications. Recently, distributed video coding (DVC) has been proposed to reduce encoding complexity to the...
Li-Wei Kang, Chun-Shien Lu
AVSS
2007
IEEE
15 years 7 months ago
Midground object detection in real world video scenes
Traditional video scene analysis depends on accurate background modeling to identify salient foreground objects. However, in many important surveillance applications, saliency is ...
Brian Valentine, Senyo Apewokin, Linda M. Wills, D...