Sciweavers

275 search results - page 14 / 55
» Localization from Incomplete Noisy Distance Measurements
Sort
View
139
Voted
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 10 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
110
Voted
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 9 months ago
Range-based Mobility Estimations in MANETs with Application to Link Availability Prediction
— The quality of communications in mobile ad-hoc networks is largely determined by the topological stability. Characterizing the mobility of mobile nodes (e.g. how often they mov...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
153
Voted
ICPR
2000
IEEE
16 years 4 months ago
A Comparative Study of Filter Based Texture Operators Using Mahalanobis Distance
Texture feature extraction operators, which comprise linear filtering, eventually followed by post-processing, are considered. The filters used are Laws' masks, filters deriv...
Simona E. Grigorescu, Nicolai Petkov, Peter Kruizi...
134
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Towards Mobile Phone Localization without War-Driving
Abstract—This paper identifies the possibility of using electronic compasses and accelerometers in mobile phones, as a simple and scalable method of localization without war-dri...
Ionut Constandache, Romit Roy Choudhury, Injong Rh...
ICASSP
2009
IEEE
15 years 10 months ago
Field inversion by consensus and compressed sensing
— We study the inversion of a random field from pointwise measurements collected by a sensor network. We assume that the field has a sparse representation in a known basis. To ...
Aurora Schmidt, José M. F. Moura