Sciweavers

18 search results - page 3 / 4
» sutc 2008
Sort
View
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
SUTC
2008
IEEE
14 years 4 months ago
On the Security of the Full-Band Image Watermark for Copyright Protection
Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. ...
Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han
SUTC
2008
IEEE
14 years 4 months ago
PNECOS: A Peer-to-Peer Network Coding Streaming System
Multimedia streaming service, such as IPTV and VoD, is one of killer applications in 4G network. Exploiting well resources of end hosts to extend the service scalability of a medi...
Tein-Yaw Chung, Chih-Cheng Wang, Yung-Mu Chen, Yan...
SUTC
2008
IEEE
14 years 4 months ago
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks
Testing and verification methodologies for Wireless Sensor Networks (WSN) systems in pre-deployment are vital for a successful deployment. Increased visibility of the internal st...
Matthias Woehrle, Christian Plessl, Roman Lim, Jan...
SUTC
2008
IEEE
14 years 4 months ago
Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks
With the availability of low-cost sensor nodes there have been many standards developed to integrate and network these nodes to form a reliable network allowing many different typ...
Vasanth Iyer, Rammurthy Garimella, M. B. Srinivas