Sciweavers

20175 search results - page 150 / 4035
» Is abstraction the key to computing
Sort
View
101
Voted
CSE
2009
IEEE
15 years 7 months ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
108
Voted
CIVR
2004
Springer
128views Image Analysis» more  CIVR 2004»
15 years 6 months ago
A Geometrical Key-Frame Selection Method Exploiting Dominant Motion Estimation in Video
We describe an original method for selecting key frames to represent the content of every shot in a video. We aim at spatially sampling in an uniform way the coverage of the scene ...
Brigitte Fauvet, Patrick Bouthemy, Patrick Gros, F...
121
Voted
CIC
2006
114views Communications» more  CIC 2006»
15 years 2 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
90
Voted
PODC
1996
ACM
15 years 5 months ago
Automated Logical Verification Based on Trace Abstractions
95-53Klarlundetal.:AutomatedLogicalVerificationbasedonTraceAbstractions BRICSBasic Research in Computer Science Automated Logical Verification Trace Abstractions Nils Klarlund Moge...
Nils Klarlund, Mogens Nielsen, Kim Sunesen
80
Voted
SAGA
2007
Springer
15 years 7 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan