Sciweavers

3356 search results - page 497 / 672
» Determining Consensus Numbers
Sort
View
JUCS
2008
124views more  JUCS 2008»
13 years 10 months ago
Structure-Based Crawling in the Hidden Web
: The number of applications that need to crawl the Web to gather data is growing at an ever increasing pace. In some cases, the criterion to determine what pages must be included ...
Márcio L. A. Vidal, Altigran Soares da Silv...
JEI
2006
128views more  JEI 2006»
13 years 10 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
KAIS
2008
151views more  KAIS 2008»
13 years 10 months ago
Expertise-based peer selection in Peer-to-Peer networks
Abstract. Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining th...
Peter Haase, Ronny Siebes, Frank van Harmelen
ECCC
2007
144views more  ECCC 2007»
13 years 10 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
JNW
2006
118views more  JNW 2006»
13 years 10 months ago
UMTS Capacity and Throughput Maximization for Different Spreading Factors
An analytical model for calculating capacity in multi-cell UMTS networks is presented. Capacity is maximized for different spreading factors and for perfect and imperfect power con...
Robert Akl, Son Nguyen