Sciweavers

3887 search results - page 657 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
SUTC
2008
IEEE
15 years 9 months ago
On the Security of the Full-Band Image Watermark for Copyright Protection
Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. ...
Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han
122
Voted
SUTC
2008
IEEE
15 years 9 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
113
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Differentiated Data Persistence with Priority Random Linear Codes
Both peer-to-peer and sensor networks have the fundamental characteristics of node churn and failures. Peers in P2P networks are highly dynamic, whereas sensors are not dependable...
Yunfeng Lin, Baochun Li, Ben Liang
142
Voted
SECON
2007
IEEE
15 years 8 months ago
Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization
Abstract—Although the characteristics of RF transmissions are physically well understood at the lowest levels of communication design, accurately incorporating power and interfer...
Steven Myers, Seapahn Megerian, Suman Banerjee, Mi...
110
Voted
BSN
2009
IEEE
106views Sensor Networks» more  BSN 2009»
15 years 7 months ago
Transitional Activity Recognition with Manifold Embedding
— Activity monitoring is an important part of pervasive sensing, particularly for assessing activities of daily living for elderly patients and those with chronic diseases. Previ...
Raza Ali, Louis Atallah, Benny P. L. Lo, Guang-Zho...