Sciweavers

1556 search results - page 262 / 312
» Information Envelope and its Information Integrity Implicati...
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 2 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
14 years 2 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
ICIP
2007
IEEE
14 years 2 months ago
Relative Position-Based Spatial Relationships using Mathematical Morphology
Spatial information is a crucial aspect of image understanding for modeling context as well as resolving the uncertainties caused by the ambiguities in low-level features. We desc...
Ramazan Gokberk Cinbis, Selim Aksoy
TABLETOP
2007
IEEE
14 years 2 months ago
Affective Tabletop Game: A New Gaming Experience for Children
In this paper, we discuss various options for enhancing the gaming experience in augmented tabletop games. More specifically, we propose to incorporate psychophysiological measure...
Abdullah Al Mahmud, Omar Mubin, Johanna Renny Octa...
WACV
2007
IEEE
14 years 2 months ago
Warped Document Image Restoration Using Shape-from-Shading and Physically-Based Modeling
With the pervasive use of handheld digital devices such as camera phones and PDAs, people have started to capture images as a way of recording information. However, due to the non...
Li Zhang, Chew Lim Tan