Sciweavers

14824 search results - page 2943 / 2965
» Security - Introduction
Sort
View
MA
2010
Springer
149views Communications» more  MA 2010»
14 years 9 months ago
A nonparametric approach to 3D shape analysis from digital camera images - I
In this article, for the first time, one develops a nonparametric methodology for an analysis of shapes of configurations of landmarks on real 3D objects from regular camera pho...
V. Patrangenaru, X. Liu, S. Sugathadasa
MDM
2010
Springer
188views Communications» more  MDM 2010»
14 years 9 months ago
A Distributed Technique for Dynamic Operator Placement in Wireless Sensor Networks
—We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameterfree...
Georgios Chatzimilioudis, Nikos Mamoulis, Dimitrio...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 9 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
PETRA
2010
ACM
14 years 9 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
SAC
2010
ACM
14 years 9 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
« Prev « First page 2943 / 2965 Last » Next »