Sciweavers

2100 search results - page 212 / 420
» Fundamentals of the problem
Sort
View
116
Voted
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 7 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
116
Voted
MDM
2009
Springer
125views Communications» more  MDM 2009»
15 years 7 months ago
Data Gathering by Mobile Mules in a Spatially Separated Wireless Sensor Network
While wireless sensor networks (WSNs) are typically targeted at large-scale deployment, due to many practical or inevitable reasons, a WSN may not always remain connected. In this...
Fang-Jing Wu, Chi-Fu Huang, Yu-Chee Tseng
100
Voted
MMSP
2008
IEEE
159views Multimedia» more  MMSP 2008»
15 years 7 months ago
A text segmentation based approach to video shot boundary detection
Abstract—Video shot boundary detection is one of the fundamental tasks of video indexing and retrieval applications. Although many methods have been proposed for this task, find...
Duy-Dinh Le, Shin'ichi Satoh, Thanh Duc Ngo, Duc A...
SP
2008
IEEE
15 years 7 months ago
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...
127
Voted
SSDBM
2008
IEEE
146views Database» more  SSDBM 2008»
15 years 7 months ago
Kriging for Localized Spatial Interpolation in Sensor Networks
Abstract. The presence of coverage holes can adversely affect the accurate representation of natural phenomena being monitored by a Wireless Sensor Network (WSN). Current WSN resea...
Muhammad Umer, Lars Kulik, Egemen Tanin