-
2
-
-
83655164934
-
Secrecy using compressive sensing
-
Agrawal, S., Vishwanath, S.: Secrecy using compressive sensing. In: ITW, pp. 563-567 (2011)
-
(2011)
ITW
, pp. 563-567
-
-
Agrawal, S.1
Vishwanath, S.2
-
3
-
-
84867194397
-
Amplify-and-forward compressed sensing as a phy-layer secrecy solution in wireless sensor networks
-
Barcelo-Llado, J., Morell, A., Seco-Granados, G.: Amplify-and-forward compressed sensing as a phy-layer secrecy solution in wireless sensor networks. In: SAM, pp. 113-116 (2012)
-
(2012)
SAM
, pp. 113-116
-
-
Barcelo-Llado, J.1
Morell, A.2
Seco-Granados, G.3
-
4
-
-
77951136076
-
Lossy compression of encrypted image by compressive sensing technique
-
Kumar, A., Makur, A.: Lossy compression of encrypted image by compressive sensing technique. In: TENCON, pp. 1-5 (2009)
-
(2009)
TENCON
, pp. 1-5
-
-
Kumar, A.1
Makur, A.2
-
5
-
-
84872953206
-
Scrambling-based speech encryption via compressed sensing
-
Zeng, L., Zhang, X., Chen, L., Fan, Z., Wang, Y.: Scrambling-based speech encryption via compressed sensing. EURASIP Journal on Advances in Signal Processing 2012, 1-27 (2012)
-
(2012)
EURASIP Journal on Advances in Signal Processing
, vol.2012
, pp. 1-27
-
-
Zeng, L.1
Zhang, X.2
Chen, L.3
Fan, Z.4
Wang, Y.5
-
6
-
-
0000340756
-
As we think
-
Bush, V.: As we think. The Atlantic Monthly 176, 101-108 (1945)
-
(1945)
The Atlantic Monthly
, vol.176
, pp. 101-108
-
-
Bush, V.1
-
7
-
-
84880760479
-
Ubiqlog: A generic mobile phone-based life-log framework
-
Rawassizadeh, R., Tomitsch, M., Wac, K., Tjoa, A.: Ubiqlog: a generic mobile phone-based life-log framework. In: Personal and Ubiquitous Computing, pp. 1-17 (2012)
-
(2012)
Personal and Ubiquitous Computing
, pp. 1-17
-
-
Rawassizadeh, R.1
Tomitsch, M.2
Wac, K.3
Tjoa, A.4
-
8
-
-
78650898251
-
The jigsaw continuous sensing engine for mobile phone applications
-
Lu, H., Liu, Z., Lane, N., Choudhury, T., Campbell, A.: The jigsaw continuous sensing engine for mobile phone applications. In: Proc. of SensSys, pp. 71-84 (2010)
-
(2010)
Proc. of SensSys
, pp. 71-84
-
-
Lu, H.1
Liu, Z.2
Lane, N.3
Choudhury, T.4
Campbell, A.5
-
9
-
-
74049084206
-
Experience explorer: A life-logging platform based on mobile context collection
-
Belimpasakis, P., Roimela, K., You, Y.: Experience explorer: a life-logging platform based on mobile context collection. In: Proc. of Third International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 77-80 (2009)
-
(2009)
Proc. of Third International Conference on Next Generation Mobile Applications, Services and Technologies
, pp. 77-80
-
-
Belimpasakis, P.1
Roimela, K.2
You, Y.3
-
10
-
-
84880759727
-
Topology based infrastructure for medical emergency coordination
-
Tatomir, B., Klapwijk, P., Rothkrantz, L.: Topology based infrastructure for medical emergency coordination. International Journal of Intelligent Control and Systems 11, 228-237 (2006)
-
(2006)
International Journal of Intelligent Control and Systems
, vol.11
, pp. 228-237
-
-
Tatomir, B.1
Klapwijk, P.2
Rothkrantz, L.3
-
11
-
-
33644638914
-
Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations
-
DOI 10.1109/TMC.2006.1599408
-
Hu, F., Wang, Y., Wu, H.: Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations. IEEE Transactions on Mobile Computing 5, 404-417 (2006) (Pubitemid 43327126)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.4
, pp. 404-417
-
-
Hu, F.1
Wang, Y.2
Wu, H.3
-
13
-
-
84880744606
-
Using lifelogging to support recollection for people with episodic memory impairment and their caregivers
-
Lee, M., Dey, A.: Using lifelogging to support recollection for people with episodic memory impairment and their caregivers. In: Proc. of HealthNet, pp. 1-14 (2008)
-
(2008)
Proc. of HealthNet
, pp. 1-14
-
-
Lee, M.1
Dey, A.2
-
15
-
-
33745204826
-
Mylifebits: A personal database for everything
-
Gemmell, J., Bell, G., Lueder, R.: Mylifebits: A personal database for everything. Communications of the ACM 49, 88-95 (2006)
-
(2006)
Communications of the ACM
, vol.49
, pp. 88-95
-
-
Gemmell, J.1
Bell, G.2
Lueder, R.3
-
16
-
-
67650844989
-
Sensor network security: A survey
-
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Communications Surveys and Tutorials 11, 52-73 (2009)
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
17
-
-
79951797071
-
Intruder tracking using wireless sensor network
-
Ramesh, M., Lekshmi, G.: Intruder tracking using wireless sensor network. In: ICCIC, pp. 1-5 (2010)
-
(2010)
ICCIC
, pp. 1-5
-
-
Ramesh, M.1
Lekshmi, G.2
-
18
-
-
77954502538
-
Practical id-based encryption for wireless sensor network
-
Chu, C, Liu, J., Zhou, J., Bao, F., Deng, R.: Practical id-based encryption for wireless sensor network. In: ASIACCS, pp. 337-340 (2010)
-
(2010)
ASIACCS
, pp. 337-340
-
-
Chu, C.1
Liu, J.2
Zhou, J.3
Bao, F.4
Deng, R.5
-
19
-
-
77954703704
-
On energy efficient encryption for video streaming in wireless sensor networks
-
Wang, W., Hempel, M., Peng, D., Wang, H., Sharif, H., Chen, H.: On energy efficient encryption for video streaming in wireless sensor networks. IEEE Transactions on Multimedia 12, 417-426 (2010)
-
(2010)
IEEE Transactions on Multimedia
, vol.12
, pp. 417-426
-
-
Wang, W.1
Hempel, M.2
Peng, D.3
Wang, H.4
Sharif, H.5
Chen, H.6
-
20
-
-
85032750937
-
An introduction to compressive sampling
-
Candes, E., Wakin, M.: An introduction to compressive sampling. IEEE Signal Processing Magazine 25(2), 21-30 (2008)
-
(2008)
IEEE Signal Processing Magazine
, vol.25
, Issue.2
, pp. 21-30
-
-
Candes, E.1
Wakin, M.2
-
21
-
-
64649083745
-
Signal recovery from random measurements via orthogonal matching pursuit
-
Tropp, J., Gilbert, A.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Transactions on Information Theory 53, 4655-4666 (2007)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, pp. 4655-4666
-
-
Tropp, J.1
Gilbert, A.2
-
22
-
-
35148883768
-
Joint distributed compression and encryption of correlated data in sensor networks
-
Haleem, M., Mathur, C, Subbalakshmi, K.: Joint distributed compression and encryption of correlated data in sensor networks. In: MILCOM, pp. 1-7 (2006)
-
(2006)
MILCOM
, pp. 1-7
-
-
Haleem, M.1
Mathur, C.2
Subbalakshmi, K.3
-
24
-
-
62349119084
-
On the security and robustness of encryption via compressed sensing
-
Chu, C, Liu, J., Zhou, J., Bao, F., Deng, R.: On the security and robustness of encryption via compressed sensing. In: MILCOM, pp. 1-7 (2008)
-
(2008)
MILCOM
, pp. 1-7
-
-
Chu, C.1
Liu, J.2
Zhou, J.3
Bao, F.4
Deng, R.5
-
26
-
-
80052170568
-
Performance analysis of the rpl routing protocol
-
Accentura, N., Grieco, L., Boggia, G., Camarda, P.: Performance analysis of the rpl routing protocol. In: ICM, pp. 767-772 (2011)
-
(2011)
ICM
, pp. 767-772
-
-
Accentura, N.1
Grieco, L.2
Boggia, G.3
Camarda, P.4
|