Sciweavers

1512 search results - page 121 / 303
» Principles of IEEE 802.11s
Sort
View
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 2 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
14 years 2 months ago
Multi-Expert Decision-Making with Linguistic Information: A Probabilistic-Based Model
It is well-known that linguistic decision-making problems that manage preferences from different experts follow a common resolution scheme composed by two phases: an aggregation p...
Van-Nam Huynh, Yoshiteru Nakamori
ICDCSW
2005
IEEE
14 years 2 months ago
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propa...
Syed A. Khayam, Hayder Radha
ICDM
2005
IEEE
189views Data Mining» more  ICDM 2005»
14 years 2 months ago
Integrating Hidden Markov Models and Spectral Analysis for Sensory Time Series Clustering
We present a novel approach for clustering sequences of multi-dimensional trajectory data obtained from a sensor network. The sensory time-series data present new challenges to da...
Jie Yin, Qiang Yang
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 2 months ago
A Reversible Watermarking Scheme for JPEG-2000 Compressed Images
In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...
Sabu Emmanuel, Chee Kiang Heng, Amitabha Das