Sciweavers

7118 search results - page 1022 / 1424
» Electrical and Computer Engineering
Sort
View
CSE
2009
IEEE
15 years 11 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
CSE
2009
IEEE
15 years 11 months ago
Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions
—In professional tennis training matches, the coach needs to be able to view play from the most appropriate angle in order to monitor players activities. In this paper, we presen...
Richard Tynan, Anthony Schoofs, Conor Muldoon, Gre...
CSE
2009
IEEE
15 years 11 months ago
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML
1 Mobile sensor nodes should be well deployed so that they maximize the area coverage with the constraint that each node has at least K neighbours, where K is a userspecified para...
Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-He...
CSE
2009
IEEE
15 years 11 months ago
Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map
Fast fusion of multiple registered out-of-focus images is of great interest in medical imaging; for example, the thoracic cavity is always too bumpy to be focused on all parts at ...
Hongbo Zhou, Qiang Cheng, Mehdi Zargham
CSE
2009
IEEE
15 years 11 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
« Prev « First page 1022 / 1424 Last » Next »