Sciweavers

1015 search results - page 112 / 203
» On Information Regularization
Sort
View
ICDCS
2005
IEEE
15 years 5 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
CCS
2008
ACM
15 years 1 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
MOBILWARE
2009
ACM
15 years 6 months ago
A Mission Management Framework for Unmanned Autonomous Vehicles
Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. UA...
Eskindir Asmare, Anandha Gopalan, Morris Sloman, N...
CVPR
2001
IEEE
16 years 1 months ago
Texture Replacement in Real Images
Texture replacement in real images has many applications, such as interior design, digital movie making and computer graphics. The goal is to replace some specified texture patter...
Yanghai Tsin, Yanxi Liu, Visvanathan Ramesh
CVPR
2006
IEEE
16 years 1 months ago
Recognize High Resolution Faces: From Macrocosm to Microcosm
Human faces manifest distinct structures and characteristics when observed in different scales. Traditional face recognition techniques mainly rely on low-resolution face images, ...
Dahua Lin, Xiaoou Tang