Sciweavers

1051 search results - page 47 / 211
» Secure Continuity for Sensor Networks
Sort
View
IJWIN
2006
209views more  IJWIN 2006»
15 years 2 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
SAC
2011
ACM
14 years 5 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
CVPR
2012
IEEE
13 years 5 months ago
Enhanced continuous sign language recognition using PCA and neural network features
In this work a Gaussian Hidden Markov Model (GHMM) based automatic sign language recognition system is built on the SIGNUM database. The system is trained on appearance-based feat...
Yannick L. Gweth, Christian Plahl, Hermann Ney
MDM
2009
Springer
192views Communications» more  MDM 2009»
15 years 9 months ago
Thresholded Range Aggregation in Sensor Networks
— The recent advances in wireless sensor technologies (e.g., Mica, Telos motes) enable the economic deployment of lightweight sensors for capturing data from their surrounding en...
Zhifeng Lin, Man Lung Yiu, Nikos Mamoulis
148
Voted
TIFS
2008
208views more  TIFS 2008»
15 years 2 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros