Sciweavers

5962 search results - page 939 / 1193
» Working with Patterns and Code
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
132
Voted
ICIP
2008
IEEE
15 years 11 months ago
Exploiting local auto-correlation function for fast video to reference image alignment
Digital images of natural scenes are usually characterized by strong spatial correlation between adjacent pixels which has been successfully exploited in the coding of still and m...
Arif Mahmood, Sohaib Khan
124
Voted
ICRA
2008
IEEE
114views Robotics» more  ICRA 2008»
15 years 11 months ago
Lazy localization using the Frozen-Time Smoother
— We present a new algorithm for solving the global localization problem called Frozen-Time Smoother (FTS). Time is ‘frozen’, in the sense that the belief always refers to th...
Andrea Censi, Gian Diego Tipaldi
146
Voted
ICSEA
2008
IEEE
15 years 11 months ago
Model-Driven Development of Human Tasks for Workflows
In order to increase efficiency, enterprises support their business processes by information technology (IT). The majority of business processes requires human interaction. By mea...
Stefan Link, Philip Hoyer, Thomas Schuster, Sebast...
ICSM
2008
IEEE
15 years 11 months ago
Software visualization with audio supported cognitive glyphs
There exist numerous software visualization techniques that aim to facilitate program comprehension. One of the main concerns in every such software visualization is to identify r...
Sandro Boccuzzo, Harald Gall