Sciweavers

1747 search results - page 275 / 350
» Location, Localization, and Localizability
Sort
View
108
Voted
ACCV
2007
Springer
15 years 7 months ago
Coarse-to-Fine Statistical Shape Model by Bayesian Inference
In this paper, we take a predefined geometry shape as a constraint for accurate shape alignment. A shape model is divided in two parts: fixed shape and active shape. The fixed shap...
Ran He, Stan Z. Li, Zhen Lei, ShengCai Liao
EUROSSC
2007
Springer
15 years 7 months ago
Recognition of User Activity Sequences Using Distributed Event Detection
We describe and evaluate a distributed architecture for the online recognition of user activity sequences. In a lower layer, simple heterogeneous atomic activities were recognised ...
Oliver Amft, Clemens Lombriser, Thomas Stiefmeier,...
IFIP
2007
Springer
15 years 7 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
114
Voted
MDM
2007
Springer
195views Communications» more  MDM 2007»
15 years 7 months ago
BORA: Routing and Aggregation for Distributed Processing of Spatio-Temporal Range Queries
This work tackles the problem of answer-aggregation for continuous spatio-temporal range queries in distributed settings. We assume a grid-like coverage of the spatial universe of...
Goce Trajcevski, Hui Ding, Peter Scheuermann, Isab...
106
Voted
PAM
2007
Springer
15 years 6 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston