Sciweavers

8135 search results - page 1415 / 1627
» network 2008
Sort
View
TCOM
2010
131views more  TCOM 2010»
15 years 2 months ago
Distance-based node activation for geographic transmissions in fading channels
In wireless multi-hop packet radio networks (MPRNs) that employ geographic transmissions, sleep schedules or node activation techniques may be used to power off some nodes to cons...
Tathagata D. Goswami, John M. Shea, Murali Rao, Jo...
TIFS
2010
127views more  TIFS 2010»
15 years 2 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
150
Voted
TIP
2010
123views more  TIP 2010»
15 years 2 months ago
Optimizing Motion Compensated Prediction for Error Resilient Video Coding
—This paper is concerned with optimization of the motion compensated prediction framework to improve the error resilience of video coding for transmission over lossy networks. Fi...
Hua Yang, Kenneth Rose
TISSEC
2010
72views more  TISSEC 2010»
15 years 2 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
TISSEC
2010
121views more  TISSEC 2010»
15 years 2 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
« Prev « First page 1415 / 1627 Last » Next »