Sciweavers

554 search results - page 23 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
CORR
2008
Springer
155views Education» more  CORR 2008»
13 years 7 months ago
On Wiretap Networks II
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume ...
Salim Y. El Rouayheb, Emina Soljanin
SEMWEB
2010
Springer
13 years 5 months ago
Linking and Building Ontologies of Linked Data
The Web of Linked Data is characterized by linking structured data from different sources using equivalence statements, such as owl:sameAs, as well as other types of linked propert...
Rahul Parundekar, Craig A. Knoblock, José L...
IH
2001
Springer
14 years 1 days ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
TMC
2008
114views more  TMC 2008»
13 years 7 months ago
SIP Multicast-Based Mobile Quality-of-Service Support over Heterogeneous IP Multimedia Subsystems
The Universal Mobile Telecommunications System (UMTS) all-IP network supports IP multimedia services through the IP Multimedia Subsystem (IMS). This paper proposes a mobile Qualit...
Shun-Ren Yang, Wen-Tsuen Chen
ICDCS
2007
IEEE
14 years 1 months ago
mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast
Application-layer overlay networks have recently emerged as a promising solution for live media multicast on the Internet. A tree is probably the most natural structure for a mult...
Feng Wang, Yongqiang Xiong, Jiangchuan Liu