Sciweavers

487 search results - page 63 / 98
» Detecting Link Spam Using Temporal Information
Sort
View
ADHOC
2006
167views more  ADHOC 2006»
15 years 3 months ago
Bypass routing: An on-demand local recovery protocol for ad hoc networks
Abstract--On-demand routing protocols for ad hoc networks reduce the cost of routing in high mobility environments. However, route discovery in on-demand routing is typically perfo...
Cigdem Sengul, Robin Kravets
CVPR
2010
IEEE
15 years 3 months ago
Scene understanding by statistical modeling of motion patterns
We present a novel method for the discovery and statistical representation of motion patterns in a scene observed by a static camera. Related methods involving learning of pattern...
Imran Saleemi, Lance Hartung, Mubarak Shah
DCOSS
2007
Springer
15 years 7 months ago
Energy-Efficient Data Acquisition Using a Distributed and Self-organizing Scheduling Algorithm for Wireless Sensor Networks
Abstract. Wireless sensor networks are often densely deployed for environmental monitoring applications. Collecting raw data from these networks can lead to excessive energy consum...
Supriyo Chatterjea, Tim Nieberg, Yang Zhang, Paul ...
TWC
2008
109views more  TWC 2008»
15 years 3 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
PR
2006
154views more  PR 2006»
15 years 3 months ago
A fuzzy logic approach for detection of video shot boundaries
Video temporal segmentation is normally the first and important step for content-based video applications. Many features including the pixel difference, colour histogram, motion, ...
Hui Fang, Jianmin Jiang, Yue Feng