Sciweavers

214 search results - page 22 / 43
» Digital Secure-Communication Using Robust Hyper-Chaotic Syst...
Sort
View
MEMOCODE
2007
IEEE
14 years 1 months ago
From WiFi to WiMAX: Techniques for High-Level IP Reuse across Different OFDM Protocols
Orthogonal Frequency-Division Multiplexing (OFDM) has become the preferred modulation scheme for both broadband and high bitrate digital wireless protocols because of its spectral...
Man Cheuk Ng, Muralidaran Vijayaraghavan, Nirav Da...
SC
2009
ACM
14 years 2 months ago
FALCON: a system for reliable checkpoint recovery in shared grid environments
In Fine-Grained Cycle Sharing (FGCS) systems, machine owners voluntarily share their unused CPU cycles with guest jobs, as long as the performance degradation is tolerable. For gu...
Tanzima Zerin Islam, Saurabh Bagchi, Rudolf Eigenm...
IH
2009
Springer
14 years 2 months ago
Forensic Tracking Watermarking against In-theater Piracy
Many illegal copies of digital movies by camcorder capture are found on the Internet or on the black market before their official release. Due to the angle of the camcorder relativ...
Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
IEEEARES
2007
IEEE
14 years 1 months ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell
ICASSP
2011
IEEE
12 years 11 months ago
Audio watermarking for acoustic propagation in reverberant environments
Digital audio watermarking has received increasing interest in the last years due to the wide range of applications it can be used for. This contribution presents a novel blind wa...
Giovanni Del Galdo, Juliane Borsum, Tobias Bliem, ...