Sciweavers

1747 search results - page 269 / 350
» Location, Localization, and Localizability
Sort
View
104
Voted
CSE
2008
IEEE
15 years 7 months ago
An Experimental Peer-to-Peer E-mail System
Conventional e-mail systems are prone to problems that affect their dependability. E-mail systems operate following a “push-based” approach: the sender side server pushes the ...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
131
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
89
Voted
ICDCS
2008
IEEE
15 years 7 months ago
Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks
Mobile sensors can move and self-deploy into a network. While focusing on the problems of coverage, existing deployment schemes mostly over-simplify the conditions for network con...
Guang Tan, Stephen A. Jarvis, Anne-Marie Kermarrec
ICDCSW
2008
IEEE
15 years 7 months ago
Design and Implementation of a WSN-Based Intelligent Light Control System
—Recently, wireless sensor networks (WSNs) have been widely discussed in many applications. In this paper, we propose a WSN-based intelligent light control system for indoor envi...
Meng-Shiuan Pan, Lun-Wu Yeh, Yen-Ann Chen, Yu-Hsua...
103
Voted
ICIP
2008
IEEE
15 years 7 months ago
An adaptive background model initialization algorithm with objects moving at different depths
Background subtraction is an essential element in most object tracking and video surveillance systems. The success of this low-level processing step is highly dependent on the qua...
Chia-Chih Chen, J. K. Aggarwal