Sciweavers

861 search results - page 148 / 173
» Detecting cuts in sensor networks
Sort
View
DCOSS
2006
Springer
15 years 1 months ago
The Virtual Pheromone Communication Primitive
We propose a generic communication primitive designed for sensor networks. Our primitive hides details of network communication while retaining sufficient programmer control over t...
Leo Szumel, John D. Owens
72
Voted
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 4 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
IEEECIT
2010
IEEE
14 years 8 months ago
A Rotate-based Best Neighborhood Matching Algorithm for High Definition Image Error Concealment
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
Liqiang He, Yanyan Zhang
JCST
2010
119views more  JCST 2010»
14 years 8 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
80
Voted
KI
2007
Springer
15 years 3 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signi...
Dieter Fox