Sciweavers

1050 search results - page 139 / 210
» Two methods of authenticated positioning
Sort
View
GLOBECOM
2007
IEEE
15 years 8 months ago
Evaluation of the Probability of K-Hop Connection in Homogeneous Wireless Sensor Networks
— Given a wireless sensor network (WSN) whose sensors are randomly and independently distributed in a bounded area following a homogeneous Poisson process with density ρ and eac...
Xiaoyuan Ta, Guoqiang Mao, Brian D. O. Anderson
107
Voted
RAID
2007
Springer
15 years 8 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
WACV
2005
IEEE
15 years 7 months ago
Dental Biometrics: Alignment and Matching of Dental Radiographs
—Dental biometrics utilizes dental radiographs for human identification. The dental radiographs provide information about teeth, including tooth contours, relative positions of n...
Hong Chen, Anil K. Jain
96
Voted
TSD
2005
Springer
15 years 7 months ago
Experimental Evaluation of Tree-Based Algorithms for Intonational Breaks Representation
Abstract. The prosodic specification of an utterance to be spoken by a Textto-Speech synthesis system can be devised in break indices, pitch accents and boundary tones. In particu...
Panagiotis Zervas, Gerasimos Xydas, Nikos Fakotaki...
108
Voted
WABI
2001
Springer
134views Bioinformatics» more  WABI 2001»
15 years 6 months ago
Comparing Assemblies Using Fragments and Mate-Pairs
Using current technology, large consecutive stretches of DNA (such as whole chromosomes) are usually assembled from short fragments obtained by shotgun sequencing, or from fragment...
Daniel H. Huson, Aaron L. Halpern, Zhongwu Lai, Eu...