A Seema, M Reisslein - IEEE Communications Surveys & …, 2010 - ieeexplore.ieee.org
The video capture, processing, and communication in wireless video sensor networks critically depend on the resources of the nodes forming the sensor networks. We provide a …
A Adams, MA Sasse - Communications of the ACM, 1999 - dl.acm.org
There is evidence that many password users do not comply with these suggested rules. DeAlvare [1] found that once a password is chosen, a user is unlikely to change it until it has …
Mounting concerns over variability, defects, and noise motivate a new approach for digital circuitry: stochastic logic, that is to say, logic that operates on probabilistic signals and so …
S Hengstler, D Prashanth, S Fong… - Proceedings of the 6th …, 2007 - dl.acm.org
Surveillance is one of the promising applications to which smart camera motes forming a vision-enabled network can add increasing levels of intelligence. We see a high degree of in …
CL Liu, CH Lee, PM Lin - Expert systems with applications, 2010 - Elsevier
The main purpose of this paper is to use off-the-shelf devices to develop a fall detection system. In human body identification, human body silhouette is adopted to improve privacy …
B Rinner, W Wolf - Proceedings of the IEEE, 2008 - ieeexplore.ieee.org
Distributed smart cameras (DSCs) are real-time distributed embedded systems that perform computer vision using multiple cameras. This new approach has emerged thanks to a …
This book is the first ever to focus on the emerging field of self-aware computing from an engineering perspective. It first comprehensively introduces fundamentals for self …
A Adams, EV Talvala, SH Park, DE Jacobs… - ACM SIGGRAPH 2010 …, 2010 - dl.acm.org
Although there has been much interest in computational photography within the research and photography communities, progress has been hampered by the lack of a portable …
S Fleck, W Straßer - Proceedings of the IEEE, 2008 - ieeexplore.ieee.org
Western societies are aging rapidly. An automated 24/7 surveillance to ensure safety of the elderly while respecting privacy becomes a major challenge. At the same time this is …