Sciweavers

1624 search results - page 292 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
139
Voted
ICCV
2001
IEEE
16 years 3 months ago
Continuous Global Evidence-Based Bayesian Modality Fusion for Simultaneous Tracking of Multiple Objects
Robust, real-time tracking of objects from visual data requires probabilistic fusion of multiple visual cues. Previous approaches have either been ad hoc or relied on a Bayesian n...
Jamie Sherrah, Shaogang Gong
HICSS
2005
IEEE
166views Biometrics» more  HICSS 2005»
15 years 7 months ago
Prototyping the Emergence of Collaborative Knowledge
E-learning growth is driven by global, societal, and technological changes that both enable and require increased worker and learner mobility, access to distributed domain experti...
Rita M. Vick, Apperson H. Johnson
DSN
2006
IEEE
15 years 7 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
219
Voted
TDSC
2011
14 years 8 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
125
Voted
ACISP
2006
Springer
15 years 7 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros