Sciweavers

1594 search results - page 7 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
MM
2004
ACM
136views Multimedia» more  MM 2004»
14 years 25 days ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
CORR
2012
Springer
195views Education» more  CORR 2012»
12 years 3 months ago
Multiple-Source Shortest Paths in Embedded Graphs
Let G be a directed graph with n vertices and non-negative weights in its directed edges, embedded on a surface of genus g, and let f be an arbitrary face of G. We describe an alg...
Sergio Cabello, Erin W. Chambers, Jeff Erickson
ISCC
2003
IEEE
14 years 20 days ago
Provisioning Algorithms in Survivable Optical Networks with Shared Protection
The efficient use of network capacity strongly depends upon the path selection procedure. In this paper we propose and evaluate efficient path selection algorithms for survivable ...
Chadi Assi, Ahmad Khalil, Nasir Ghani, Mohamed A. ...