Sciweavers

5386 search results - page 69 / 1078
» Approaches to Multimedia and Security
Sort
View
EMSOFT
2006
Springer
14 years 1 months ago
Energy adaptation for multimedia information kiosks
Video kiosks increasingly contain powerful PC-like embedded processors, allowing them to display video at a high level of quality. Such video display, however, entails significant...
Richard Urunuela, Gilles Muller, Julia L. Lawall
IASTEDSEA
2004
13 years 11 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
CRISIS
2008
13 years 11 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
ICIP
2007
IEEE
14 years 4 months ago
Estimating Missing Features to Improve Multimedia Retrieval
Retrieval in a multimedia database usually involves combining information from different modalities of data, such as text and images. However, all modalities of the data may not b...
Abraham Bagherjeiran, Nicole S. Love, Chandrika Ka...
ISSS
2000
IEEE
128views Hardware» more  ISSS 2000»
14 years 2 months ago
Hardware Synthesis from SPDF Representation for Multimedia Applications
Even though high-level hardware synthesis from dataflow graphs becomes popular in designing DSP systems, currently used dataflow models are inefficient to deal with emerging multi...
Chanik Park, Soonhoi Ha