Sciweavers

5948 search results - page 992 / 1190
» Computing Robust Counter-Strategies
Sort
View
158
Voted
CVPR
2010
IEEE
16 years 5 days ago
Human Identity Recognition in Aerial Images
Human identity recognition is an important yet underaddressed problem. Previous methods were strictly limited to high quality photographs, where the principal techniques heavily...
Omar Oreifej, Ramin Mehran, and Mubarak Shah
130
Voted
IPSN
2010
Springer
15 years 10 months ago
Distributed genetic evolution in WSN
Wireless Sensor Actuator Networks (WSANs) extend wireless sensor networks through actuation capability. Designing robust logic for WSANs however is challenging since nodes can aï¬...
Philip Valencia, Peter Lindsay, Raja Jurdak
124
Voted
ISBI
2009
IEEE
15 years 10 months ago
A Non-Parametric Approach to Automatic Change Detection in MRI Images of the Brain
We present a novel approach to change detection between two brain MRI scans (reference and target.) The proposed method uses a single modality to ï¬nd subtle changes; and does no...
Hae Jong Seo, Peyman Milanfar
PERCOM
2009
ACM
15 years 10 months ago
Adaptive Linear Filtering Compression on Realtime Sensor Networks
Abstract—We present a lightweight lossless compression algorithm for realtime sensor networks. Our proposed Adaptive Linear Filtering Compression (ALFC) algorithm performs predic...
Aaron B. Kiely, Mingsen Xu, Wen-Zhan Song, Renjie ...
119
Voted
CCS
2009
ACM
15 years 10 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored ï¬le is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea