Sciweavers

1098 search results - page 216 / 220
» New Data Types and Operations to Support Geo-streams
Sort
View
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
14 years 1 months ago
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model
—We present a novel particle filter implementation for estimating the pose of tags in the environment with respect to an RFID-equipped robot. This particle filter combines sign...
Travis Deyle, Charles C. Kemp, Matthew S. Reynolds
ICISS
2005
Springer
14 years 28 days ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
PDC
2004
ACM
14 years 25 days ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 8 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 25 days ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal