Sciweavers

948 search results - page 159 / 190
» Designing technology for community appropriation
Sort
View
ISCIS
2005
Springer
14 years 27 days ago
Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation
A P2P network that is overlayed over Internet can consist of thousands, or even millions of nodes. To analyze the performance of a P2P network, or an algorithm or protocol designed...
Selim Ciraci, Ibrahim Korpeoglu, Özgür U...
KES
2005
Springer
14 years 27 days ago
Comparison of Feature Extraction Techniques for Watermark Synchronization
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...
Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee
WPES
2004
ACM
14 years 25 days ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
KES
2004
Springer
14 years 23 days ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
SEMWEB
2004
Springer
14 years 22 days ago
Opening Up Magpie via Semantic Services
Abstract. Magpie is a suite of tools supporting a ‘zero-cost’ approach to semantic web browsing: it avoids the need for manual annotation by automatically associating an ontolo...
Martin Dzbor, Enrico Motta, John Domingue