Sciweavers

502 search results - page 58 / 101
» Deploying a New Hash Algorithm
Sort
View
ADHOC
2007
109views more  ADHOC 2007»
14 years 12 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ICCV
2005
IEEE
16 years 1 months ago
Fundamental Matrix for Cameras with Radial Distortion
When deploying a heterogeneous camera network or when we use cheap zoom cameras like in cell-phones, it is not practical, if not impossible to off-line calibrate the radial distor...
João P. Barreto, Kostas Daniilidis
DIM
2009
ACM
15 years 6 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
IPSN
2003
Springer
15 years 5 months ago
Energy Based Acoustic Source Localization
A novel source localization approach using acoustic energy measurements from the individual sensors in the sensor field is presented. This new approach is based on the acoustic en...
Xiaohong Sheng, Yu Hen Hu
CVPR
2007
IEEE
16 years 1 months ago
Spatial selection for attentional visual tracking
Long-duration tracking of general targets is quite challenging for computer vision, because in practice target may undergo large uncertainties in its visual appearance and the unc...
Ming Yang, Junsong Yuan, Ying Wu