Sciweavers

24529 search results - page 4794 / 4906
» Computing on Authenticated Data
Sort
View
IMC
2004
ACM
15 years 8 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
ISSTA
2004
ACM
15 years 8 months ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner
MM
2004
ACM
100views Multimedia» more  MM 2004»
15 years 8 months ago
GURU: a multimedia distance-learning framework for users with disabilities
GURU is a distance-learning environment that renders multimedia information to users with disabilities in an accessible manner. It is an implementation framework developed as part...
Vidhya Balasubramanian, Nalini Venkatasubramanian
MM
2004
ACM
155views Multimedia» more  MM 2004»
15 years 8 months ago
Disruption-tolerant content-aware video streaming
Communication between a pair of nodes in the network may get disrupted due to failures of links/nodes resulting in zero effective bandwidth between them during the recovery perio...
Tiecheng Liu, Srihari Nelakuditi
120
Voted
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 8 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
« Prev « First page 4794 / 4906 Last » Next »