Recherche
Voici les éléments 11-20 de 428
Reversible data hiding scheme for the H.264/AVC codec
(2013-06-24)
Very few reversible data hiding methods are proposed for compressed video and particularly for the H.264/AVC video codec, despite the importance of both of the watermarking reversibility criterion and the codec. The ...
Cloud Computing
(CERIST, 2015)
Le concept Cloud Computing a connu un développement remarquable ces dernières années. Son principe est de déporter le traitement et le stockage des données des utilisateurs sur des infrastructures accessibles depuis internet ...
Efficient CP-ABE Attribute/Key Management for IoT Applications
(IEEE, 2015-10)
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising cryptographic mechanism for
fine-grained access control to shared data. Attribute/Key management is a keystone issue in CP-APE because of low efficiency ...
Recommendation Based on User’s Interest Case Study: Handicrafts women in emerging countries.
(CERIST, 2015-10-29)
Social tagging systems promote resources sharing, organization and
improve information retrieval. In the area of handicraft women, social tagging
improves collaboration between users, by recommending some users to ...
Weighting of conceptual neighborhood graph for multimedia documents temporal adaptation
(CERIST, 2010-09)
In the approaches of the semantic adaptation of a multimedia document, where this last is represented by an abstract structure of a relations graph that expresses all the relations that exist between its contained media ...
Binarization of Degraded Historical Document Images
(CERIST, 2014)
Old document images often suffer from different types of degradation that render their binarization a challenging task. In this paper, a new binarization algorithm for degraded document images is presented. The method is ...
Locating Emergency Responders using Mobile Wireless Sensor Networks
(ISCRAM, 2013-05)
Emergency response in disaster management using wireless sensor networks has recently become an interest of many researchers in the world. This interest comes from the growing number of disasters and crisis (natural or ...
Efficient data aggregation scheduling in wireless sensor networks with multi-channel links
(ACM, 2013)
In-network data aggregation is often pursued to remove redundancy and correlate the data en-route to the base-station in order to save energy in wireless sensor networks (WSNs). In this paper, we present a novel cross-layer ...
MTCP: a new transport protocol for wireless mesh networks
(CERIST, 2011-01)
Throughput is the main concern in Wireless Mesh Networks (WMNs). The standard congestion control mechanism of TCP[7] is not able to handle the special properties of a shared wireless multi-hop channel well. Given that the ...
An Authentication Scheme for heterogeneous Wireless Sensor Networks in the context of Internet of Things
(CERIST, 2016-02-21)
The evolution of Internet of Things (IoT) is changing
traditional perceptions of the current Internet towards a
vision of smart objects interacting with each other. Wireless
Sensor Networks play an important role and ...