Sciweavers

112 search results - page 18 / 23
» An informed synchronization scheme for audio data hiding
Sort
View
INFOCOM
2011
IEEE
12 years 10 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
EUROMICRO
1998
IEEE
13 years 11 months ago
Experiments with MHEG Player/Studio: An Interactive Hypermedia Visualization and Authoring System
With the growing needs of information sharing and exchange, MHEG-6(Multimedia Hypermedia information coding Expert Group - part 6) standard is defined so as to provide the interna...
Seungtaek Oh, Yung Yi, Seunghoon Jeong, Yanghee Ch...
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
14 years 8 months ago
Collaborative Wrapping: A Turbo Framework for Web Data Extraction
To access data sources on the Web, a crucial step is wrapping, which translates query responses, rendered in textual HTML, back into their relational form. Traditionally, this pro...
Shui-Lung Chuang, Kevin Chen-Chuan Chang, ChengXia...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
ICON
2007
IEEE
14 years 1 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...