Sciweavers

726 search results - page 74 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
ICIP
1999
IEEE
14 years 9 months ago
Spiht for Generalized Multiple Description Coding
W e present a simple and eficient scheme for using the Set Partitioning in Hierarchical Trees (SPIHT) image compression algorithm [l]in a generalized multiple description framewor...
Agnieszka C. Miguel, Alexander E. Mohr, Eve A. Ris...
SDMW
2004
Springer
14 years 1 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
MSN
2007
Springer
151views Sensor Networks» more  MSN 2007»
14 years 1 months ago
A Low Latency MAC Scheme for Event-Driven Wireless Sensor Networks
In this paper, we present a low latency media access control scheme which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind of WSN, sens...
Hung-Cuong Le, Hervé Guyennet, Violeta Fele...
MOBICOM
2004
ACM
14 years 1 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the e...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
14 years 1 months ago
Reuse or Never Reuse the Deleted Labels in XML Query Processing Based on Labeling Schemes
To facilitate the XML query processing, several kinds of labeling schemes have been proposed. Based on the labeling schemes, the ancestordescendant and parent-child relationships i...
Changqing Li, Tok Wang Ling, Min Hu