Sciweavers

3116 search results - page 554 / 624
» Design and implementation of network puzzles
Sort
View
HT
2004
ACM
15 years 9 months ago
Dynamically growing hypertext collections
Many approaches have been pursued over the years to facilitate creating, organizing, and sharing collections of materials extracted from large information spaces. Little attention...
Pratik Dave, Paul Logasa Bogen II, Unmil Karadkar,...
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 9 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
WPES
2004
ACM
15 years 9 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
AP2PC
2004
Springer
15 years 9 months ago
An Agent Module for a System on Mobile Devices
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
CCS
2004
ACM
15 years 9 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii