Sciweavers

4335 search results - page 719 / 867
» Privatizing Constraint Optimization
Sort
View
IEEEIAS
2008
IEEE
15 years 8 months ago
Information Assurance in Critical Infrastructures via Wireless Sensor Networks
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Michele Albano, Stefano Chessa, Roberto Di Pietro
INFOCOM
2008
IEEE
15 years 8 months ago
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes
—In this paper, we propose a novel transport protocol that effectively utilizes available bandwidth and diversity gains provided by heterogeneous, highly lossy paths. Our Multi-P...
Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar,...
INFOCOM
2008
IEEE
15 years 8 months ago
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
—Sleep-wake scheduling is an effective mechanism to prolong the lifetime of energy-constrained wireless sensor networks. However, it incurs an additional delay for packet deliver...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun S...
130
Voted
IROS
2008
IEEE
187views Robotics» more  IROS 2008»
15 years 8 months ago
Monocular visual odometry in urban environments using an omnidirectional camera
— We present a system for Monocular Simultaneous Localization and Mapping (Mono-SLAM) relying solely on video input. Our algorithm makes it possible to precisely estimate the cam...
Jean-Philippe Tardif, Yanis Pavlidis, Kostas Danii...
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 8 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...