Sciweavers

13553 search results - page 2531 / 2711
» A Generalized Multi-View Approach
Sort
View
123
Voted
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
133
Voted
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
MOBICOM
2004
ACM
15 years 9 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...
131
Voted
MOBICOM
2004
ACM
15 years 9 months ago
Localization for mobile sensor networks
Many sensor network applications require location awareness, but it is often too expensive to include a GPS receiver in a sensor network node. Hence, localization schemes for sens...
Lingxuan Hu, David Evans
114
Voted
MSWIM
2004
ACM
15 years 9 months ago
Energy map construction for wireless sensor network under a finite energy budget
A fundamental issue in the design of a wireless sensor network is to devise mechanisms to make efficient use of its energy, and thus, extend its lifetime. Due to the paramount imp...
Raquel A. F. Mini, Antonio Alfredo Ferreira Lourei...
« Prev « First page 2531 / 2711 Last » Next »