Sciweavers

15375 search results - page 308 / 3075
» cans 2008
Sort
View
JCM
2008
77views more  JCM 2008»
15 years 4 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
TWC
2008
103views more  TWC 2008»
15 years 4 months ago
Semi-Distributed User Relaying Algorithm for Amplify-and-Forward Wireless Relay Networks
In this paper, designing an effective user relaying algorithm, in terms of relay node selection and power allocation, is discussed for amplify-and-forward wireless relay networks. ...
Jun Cai, Xuemin Shen, Jon W. Mark, Attahiru Sule A...
PERCOM
2008
ACM
16 years 4 months ago
Composition and Generalization of Context Data for Privacy Preservation
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
Linda Pareschi, Daniele Riboni, Alessandra Agostin...
ICARCV
2008
IEEE
188views Robotics» more  ICARCV 2008»
15 years 10 months ago
Achievable safety of driverless ground vehicles
—Safety is an important issue of driverless car. Yet, most current approaches fail to ensure safety even in a fully informed situation. In this paper we discuss how the safety cr...
Rodrigo Benenson, Thierry Fraichard, Michel Parent
FLAIRS
2008
15 years 6 months ago
Narratoria, an Authoring Suite for Digital Interactive Narrative
In this paper we present an authoring tool called Narratoria1 that allows non-technical experts in the field of digital entertainment to create interactive narratives with 3D grap...
Martin Van Velsen