Sciweavers

24554 search results - page 4891 / 4911
» Dependable distributed systems
Sort
View
TPDS
2002
141views more  TPDS 2002»
13 years 9 months ago
Integration of Pricing with Call Admission Control to Meet QoS Requirements in Cellular Networks
Call Admission Control (CAC) plays a significant role in providing the desired Quality of Service (QoS) in cellular networks. Traditional CAC schemes that mainly focus on the trade...
Jiongkuan Hou, Jie Yang, Symeon Papavassiliou
VLDB
2002
ACM
116views Database» more  VLDB 2002»
13 years 9 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
COMCOM
2008
104views more  COMCOM 2008»
13 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
PVLDB
2008
141views more  PVLDB 2008»
13 years 9 months ago
WebTables: exploring the power of tables on the web
The World-Wide Web consists of a huge number of unstructured documents, but it also contains structured data in the form of HTML tables. We extracted 14.1 billion HTML tables from...
Michael J. Cafarella, Alon Y. Halevy, Daisy Zhe Wa...
SAC
2008
ACM
13 years 9 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann
« Prev « First page 4891 / 4911 Last » Next »