Sciweavers

4899 search results - page 762 / 980
» Robust normative systems
Sort
View
SECON
2010
IEEE
14 years 8 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
USS
2010
14 years 8 months ago
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation
Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specifi...
Phillipa Gill, Yashar Ganjali, Bernard Wong, David...
ICRA
2009
IEEE
155views Robotics» more  ICRA 2009»
14 years 8 months ago
Active multi-view object search on a humanoid head
Visual search is a common daily human activity and a prerequisite to the interaction with objects encountered in cluttered environments. Humanoid robots that are supposed to take p...
Kai Welke, Tamim Asfour, Rüdiger Dillmann
CVIU
2010
184views more  CVIU 2010»
14 years 8 months ago
Vision and RFID data fusion for tracking people in crowds by a mobile robot
In this paper, we address the problem of realizing a human following task in a crowded environment. We consider an active perception system, consisting of a camera mounted on a pa...
Thierry Germa, Frédéric Lerasle, Nou...
ACL
2011
14 years 2 months ago
Joint Annotation of Search Queries
Marking up search queries with linguistic annotations such as part-of-speech tags, capitalization, and segmentation, is an important part of query processing and understanding in ...
Michael Bendersky, W. Bruce Croft, David A. Smith