Sciweavers

2642 search results - page 155 / 529
» The development of Chez Scheme
Sort
View
84
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 21 days ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
91
Voted
PAMI
2008
160views more  PAMI 2008»
15 years 21 days ago
Parametric Image Alignment Using Enhanced Correlation Coefficient Maximization
In this work, we propose the use of a modified version of the correlation coefficient as a performance criterion for the image alignment problem. The proposed modification has the ...
Georgios D. Evangelidis, Emmanouil Z. Psarakis
117
Voted
IJDMB
2007
110views more  IJDMB 2007»
15 years 20 days ago
Transductive learning with EM algorithm to classify proteins based on phylogenetic profiles
: Phylogenetic profiles of proteins  strings of ones and zeros encoding respectively the presence and absence of proteins in a group of genomes  have recently been used to id...
Roger A. Craig, Li Liao
119
Voted
JCM
2007
191views more  JCM 2007»
15 years 20 days ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
77
Voted
JCM
2007
98views more  JCM 2007»
15 years 20 days ago
A Fault Tolerance Management Framework for Wireless Sensor Networks
Abstract— Wireless Sensor Networks (WSNs) have the potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a faulttoler...
Iman Saleh, Mohamed Eltoweissy, Adnan Agbaria, Hes...