Sciweavers

1942 search results - page 114 / 389
» Matroids from modules
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 8 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
ICPR
2004
IEEE
14 years 10 months ago
Object-Based and Event-Based Semantic Video Adaptation
Semantic video adaptation allows to transmit video content with different viewing quality, depending on the relevance of the content from the user's viewpoint. To this end, a...
Marco Bertini, Alberto Del Bimbo, Rita Cucchiara, ...
POPL
2004
ACM
14 years 9 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds
ICASSP
2008
IEEE
14 years 3 months ago
Adaptive detection for a differential chaos-based multiple access system on unknown multipath fading channels
This paper addresses the problem of bit detection for a chaos-based multiple-access system. In particular, one considers the Differential Chaos Shift Keying modulation. It is assu...
Martial Coulon, Daniel Roviras
ICPR
2008
IEEE
14 years 3 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma