Sciweavers

2327 search results - page 330 / 466
» Secure Image Filtering
Sort
View
DCOSS
2006
Springer
15 years 5 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
TPDS
2010
99views more  TPDS 2010»
14 years 12 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
CVPR
2003
IEEE
16 years 3 months ago
Mean-shift Blob Tracking through Scale Space
The mean-shift algorithm is an efficient technique for tracking 2D blobs through an image. Although the scale of the mean-shift kernel is a crucial parameter, there is presently n...
Robert T. Collins
CVPR
2007
IEEE
16 years 3 months ago
A Topic-Motion Model for Unsupervised Video Object Discovery
The bag-of-words representation has attracted a lot of attention recently in the field of object recognition. Based on the bag-of-words representation, topic models such as Probab...
David Liu, Tsuhan Chen
ICCV
2001
IEEE
16 years 3 months ago
Stochastic Road Shape Estimation
We describe a new system for estimating road shape ahead of a vehicle for the purpose of driver assistance. The method utilises a single on board colour camera, together with iner...
Ben Southall, Camillo J. Taylor