Sciweavers

3674 search results - page 239 / 735
» Information Dependencies
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 7 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
96
Voted
CCS
2007
ACM
15 years 7 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
74
Voted
VC
2008
66views more  VC 2008»
15 years 20 days ago
Services surround you
Our daily life is pervaded by digital information and devices, not least the common mobile phone. However, a seamless connection between our physical world, such as a movie trailer...
Niels Henze, René Reiners, Xavier Righetti,...
91
Voted
SWAP
2008
15 years 2 months ago
Building Web Annotation Stickies based on Bidirectional Links
Abstract. We propose a web annotation system which adds the functionality of stickies to web pages and creates bidirectional links between the stickies. The stickies allow for impo...
Hiroyuki Sano, Taiki Ito, Tadachika Ozono, Toramat...
93
Voted
ICASSP
2010
IEEE
15 years 29 days ago
Hierarchical language modeling for audio events detection in a sports game
We investigate the automatic labelling of “events” from an audio recording of a sports game. We describe a technique that utilises a hierarchy of language models, which are a ...
Qiang Huang, Stephen Cox