Sciweavers

2517 search results - page 130 / 504
» Secure Deployment of Components
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 7 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
GLOBECOM
2010
IEEE
15 years 1 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang
139
Voted
IROS
2007
IEEE
180views Robotics» more  IROS 2007»
15 years 10 months ago
Detection of thrown objects in indoor and outdoor scenes
— We present a novel technique for the detection of hand-thrown objects in a video sequence. Our method runs in real-time and was designed to be used as a component in a deployed...
Evan Ribnick, Stefan Atev, Nikolaos Papanikolopoul...
131
Voted
ISCIS
2004
Springer
15 years 9 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
129
Voted
BIOSIG
2003
89views Biometrics» more  BIOSIG 2003»
15 years 5 months ago
How to Test the Performance of Speech Verifiers and Statistical Evaluation
Abstract: Biometric identification and verification technologies, in the past, have promised high performance levels. Such performance statements lead to the assumption, that these...
Jörg Tacke, Andreas Wolf