Sciweavers

924 search results - page 134 / 185
» Internet Routing Instability
Sort
View
ICIP
2004
IEEE
14 years 9 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
SIGMOD
2005
ACM
136views Database» more  SIGMOD 2005»
14 years 7 months ago
Peer-to-peer management of XML data: issues and research challenges
Peer-to-peer (p2p) systems are attracting increasing attention as an efficient means of sharing data among large, diverse and dynamic sets of users. The widespread use of XML as a...
Georgia Koloniari, Evaggelia Pitoura
AICT
2006
IEEE
14 years 1 months ago
Networks without Borders: Communication despite Disconnection
Communication in the face of intermittent, short-lived and unreliable connectivity can be difficult when relying solely on Internet protocols which have an implicit assumption of...
Gregory Kempe, Norman C. Hutchinson
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Error Resilient Multiple Description Compression of Vector Graphics
This research is motivated by the needs of robust streaming of vector graphics contents over the Internet, wireless and other lossy networks. We present a multiple description cod...
Martin Röder, Xiaolin Wu, Sorina Dumitrescu
EGC
2005
Springer
14 years 1 months ago
Rapid Distribution of Tasks on a Commodity Grid
The global internet is rich in commodity resources but scarce in specialized resources. We argue that a grid framework can achieve better performance if it separates the management...
Ladislau Bölöni, Damla Turgut, Taskin Ko...