Sciweavers

239 search results - page 38 / 48
» Blooms
Sort
View
FAST
2003
13 years 8 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
13 years 7 months ago
H.264 stream replacement watermarking with CABAC encoding
This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded ...
Dekun Zou, Jeffrey A. Bloom
IJCSA
2008
96views more  IJCSA 2008»
13 years 7 months ago
Integration of Educational Specifications and Standards to Support Adaptive Learning Scenarios in ADAPTAPlan
ADAPTAPlan project provides dynamic assistance for reducing authors' effort in developing instructional design tasks using user modelling, planning and machine learning techn...
Silvia Baldiris, Olga C. Santos, Carmen Barrera, J...
IJISEC
2006
119views more  IJISEC 2006»
13 years 7 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
IJSN
2007
106views more  IJSN 2007»
13 years 7 months ago
Hash-AV: fast virus signature scanning by cache-resident filters
Abstract— Fast virus scanning is becoming increasingly important in today’s Internet. While Moore’s law continues to double CPU cycle speed, virus scanning applications fail ...
Ozgun Erdogan, Pei Cao