Sciweavers

1277 search results - page 18 / 256
» An Evaluation Approach for Dynamics-Aware Applications Using...
Sort
View
ICUMT
2009
13 years 5 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
EMNLP
2010
13 years 5 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
BILDMED
2009
180views Algorithms» more  BILDMED 2009»
13 years 8 months ago
Automatic Needle Segmentation in 3D Ultrasound Data Using a Hough Transform Approach
Segmentation in ultrasound data is a very challenging field of research in medical image processing. This article presents a method for automatic segmentation of biopsy needles and...
Philipp Hartmann, Matthias Baumhauer, Jens Rasswei...
ICN
2009
Springer
14 years 2 months ago
CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications
Using internet for media-based real-time collaboration has become widespread activity. In this paper, we present a framework called CoUniverse, designed for building realtime user...
Milos Liska, Petr Holub
DSN
2005
IEEE
14 years 1 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...