Sciweavers

4529 search results - page 78 / 906
» Position Based Cryptography
Sort
View
COMSWARE
2007
IEEE
15 years 11 months ago
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
— We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the rst positioning...
Christophe Baraer, Kaustubh S. Phanse, Johan Nykvi...
GLOBECOM
2007
IEEE
15 years 11 months ago
Position Estimation Error in Edge Detection for Wireless Sensor Networks using Local Convex View
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
Marwan Fayed, Hussein T. Mouftah
IBPRIA
2007
Springer
15 years 11 months ago
False Positive Reduction in Breast Mass Detection Using Two-Dimensional PCA
In this paper we present a novel method for reducing false positives in breast mass detection. Our approach is based on using the Two-Dimensional Principal Component Analysis (2DPC...
Arnau Oliver, Xavier Lladó, Joan Mart&iacut...
FPL
2005
Springer
114views Hardware» more  FPL 2005»
15 years 10 months ago
Measuring and Utilizing the Correlation Between Signal Connectivity and Signal Positioning for FPGAs Containing Multi-Bit Buildi
As the logic capacity of FPGA increases, there has been a corresponding increase in the variety of FPGA building blocks. From a mere collection of the conventional logic blocks, F...
Andy Gean Ye, Jonathan Rose
124
Voted
INFOCOM
2002
IEEE
15 years 10 months ago
Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms
—This paper utilizes belief networks to implement fault localization in communication systems taking into account comprehensive information about the system behavior. Most previo...
Malgorzata Steinder, Adarshpal S. Sethi