Sciweavers

5186 search results - page 879 / 1038
» Embedded Systems
Sort
View

Book
1069views
13 years 9 months ago
Sustainable Wireless Sensor Networks
Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed in large ...
117
Voted
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 9 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
136
Voted
IMC
2009
ACM
15 years 10 months ago
Sampling biases in network path measurements and what to do about it
We show that currently prevalent practices for network path measurements can produce inaccurate inferences because of sampling biases. The inferred mean path latency can be more t...
Srikanth Kandula, Ratul Mahajan
ECCV
2006
Springer
16 years 5 months ago
Robust Visual Tracking for Multiple Targets
We address the problem of robust multi-target tracking within the application of hockey player tracking. The particle filter technique is adopted and modified to fit into the multi...
Yizheng Cai, Nando de Freitas, James J. Little