Sciweavers

3303 search results - page 180 / 661
» Multidimensional Access Methods
Sort
View
JDCTA
2008
88views more  JDCTA 2008»
15 years 1 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
TASLP
2010
177views more  TASLP 2010»
14 years 8 months ago
A Watermarking-Based Method for Informed Source Separation of Audio Signals With a Single Sensor
In this paper, the issue of audio source separation from a single channel is addressed, i.e. the estimation of several source signals from a single observation of their mixture. Th...
Mathieu Parvaix, Laurent Girin, Jean-Marc Brossier
NOSSDAV
2005
Springer
15 years 6 months ago
ACE: an active, client-directed method for reducing energy during web browsing
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transit...
Haijin Yan, David K. Lowenthal, Kang Li
CONTEXT
2001
Springer
15 years 5 months ago
WordSieve: A Method for Real-Time Context Extraction
Abstract. In order to be useful, intelligent information retrieval agents must provide their users with context-relevant information. This paper presents WordSieve, an algorithm fo...
Travis Bauer, David B. Leake
AIL
2006
84views more  AIL 2006»
15 years 1 months ago
Meaningful electronic signatures based on an automatic indexing method
Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in conce...
Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous, Nat...