Sciweavers

2421 search results - page 425 / 485
» Message from the Editor-in-Chief
Sort
View
ICASSP
2009
IEEE
14 years 3 months ago
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with...
Avinash L. Varna, Shantanu Rane, Anthony Vetro
ICPP
2009
IEEE
14 years 3 months ago
Run to Potential: Sweep Coverage in Wireless Sensor Networks
—Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how w...
Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu,...
INFOCOM
2009
IEEE
14 years 3 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
WADS
2009
Springer
226views Algorithms» more  WADS 2009»
14 years 3 months ago
Online Priority Steiner Tree Problems
Abstract. A central issue in the design of modern communication networks is the provision of Quality-of-Service (QoS) guarantees at the presence of heterogeneous users. For instanc...
Spyros Angelopoulos
CIKM
2009
Springer
14 years 3 months ago
Using multiple ontologies in information extraction
Ontology-Based Information Extraction (OBIE) has recently emerged as a subfield of Information Extraction (IE). Here, ontologies - which provide formal and explicit specificatio...
Daya C. Wimalasuriya, Dejing Dou