Sciweavers

1050 search results - page 46 / 210
» Two methods of authenticated positioning
Sort
View
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 6 months ago
A Walking Beacon-Assisted Localization in Wireless Sensor Networks
—The localization of the sensor node is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can a...
Bin Xiao, Hekang Chen, Shuigeng Zhou
CIA
2004
Springer
15 years 5 months ago
Design and Implementation of Agent Community Based Peer-to-Peer Information Retrieval Method
This paper presents an agent community based peer-to-peer information retrieval method called ACP2P method[16] and discusses the experimental results of the method. The ACP2P metho...
Tsunenori Mine, Daisuke Matsuno, Akihiro Kogo, Mak...
BMCBI
2007
144views more  BMCBI 2007»
14 years 11 months ago
Assessing the ability of sequence-based methods to provide functional insight within membrane integral proteins: a case study an
Background: Efforts to predict functional sites from globular proteins is increasingly common; however, the most successful of these methods generally require structural insight. ...
Dennis R. Livesay, Patrick D. Kidd, Sepehr Eskanda...
CVPR
2005
IEEE
16 years 1 months ago
Eye Gaze Tracking under Natural Head Movements
Most available remote eye gaze trackers based on Pupil Center Corneal Reflection (PCCR) technique have two characteristics that prevent them from being widely used as an important...
Zhiwei Zhu, Qiang Ji
ACCV
2007
Springer
15 years 6 months ago
Object Detection Combining Recognition and Segmentation
Abstract. We develop an object detection method combining top-down recognition with bottom-up image segmentation. There are two main steps in this method: a hypothesis generation s...
Liming Wang, Jianbo Shi, Gang Song, I-fan Shen