Sciweavers

5386 search results - page 53 / 1078
» Approaches to Multimedia and Security
Sort
View
ICMCS
2005
IEEE
77views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Techniques of reconstructing overlay multicast trees for multimedia streaming
Overlay multicast is an efficient and deployable approach for delivering multimedia content to a large number of receivers. A key problem in overlay multicast is how to deal with...
Mengkun Yang, Zongming Fei
SIGIR
2010
ACM
13 years 10 months ago
A picture is worth a thousand search results: finding child-oriented multimedia results with collAge
We present a simple and effective approach to complement search results for children's web queries with child-oriented multimedia results, such as coloring pages and music sh...
Karl Gyllstrom, Marie-Francine Moens
CASES
2010
ACM
13 years 8 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
DSD
2009
IEEE
106views Hardware» more  DSD 2009»
14 years 1 months ago
Model-Driven Design of Embedded Multimedia Applications on SoCs
This paper addresses the design issue of System-onelevating the design abstraction levels, through a model-driven approach. It considers the standard Marte profile, which is dedic...
Adolf Abdallah, Abdoulaye Gamatié, Jean-Luc...
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
14 years 1 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek