Sciweavers

3887 search results - page 712 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 11 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
ETFA
2008
IEEE
15 years 8 months ago
CoReDac: Collision-free command-response data collection
Most of the existing sensor network deployments are convergecast data collection applications that transmit data from multiple sources to a sink. In this paper, we present CoReDac...
Thiemo Voigt, Fredrik Österlind
103
Voted
SUTC
2006
IEEE
15 years 8 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
EUSFLAT
2001
125views Fuzzy Logic» more  EUSFLAT 2001»
15 years 3 months ago
Computational intelligence approaches for parametric estimation and feature extraction of power spectral density
This paper reports an early progress of a feasibility study of a computational intelligence approach to the enhancement of the accuracy of flow measurements in the framework of a ...
Da Ruan, Davide Roverso, Paolo F. Fantoni
PAMI
2007
157views more  PAMI 2007»
15 years 1 months ago
Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
—Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (p...
Anil K. Jain, Yi Chen, Meltem Demirkus