Sciweavers

2421 search results - page 394 / 485
» Message from the Co-Chairs
Sort
View
IMC
2003
ACM
14 years 2 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 2 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
EUROCRYPT
2003
Springer
14 years 2 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
EUROMICRO
2002
IEEE
14 years 2 months ago
Feasibility Analysis for Web Project Engineering Encoded as Rule-Based Expert System
The initial steps in carrying out a feasibility analysis for a web project, based on information obtained interactively from a prospective client, are modelled as a rulebased expe...
Pablo Gervás, Juan José Escribano Ot...
C5
2009
IEEE
14 years 1 months ago
The PresenceDetector: Context Awareness for Collaboration
In this paper we introduce a concept of how the status of project partners in a virtual collaboration environment can be transferred in a subtle manner to gain useful information ...
Moritz Kemper, Constanze Langer, Christine Strotho...