Sciweavers

91 search results - page 14 / 19
» New approaches to encryption and steganography for digital v...
Sort
View
ACSE
2000
ACM
13 years 11 months ago
A streamlined system for building online presentation archives using SMIL
The demand for and expectation of ubiquitous access to multimedia online learning resources are much higher amongst computer science students than other fields of study. Previous ...
Darren James, Jane Hunter
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
14 years 6 days ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ICMCS
2007
IEEE
93views Multimedia» more  ICMCS 2007»
14 years 1 months ago
POEMS: A Paper Based Meeting Service Management Tool
As more and more tools are developed for meeting support tasks, properly using these tools to get expected results becomes too complicated for many meeting participants. To addres...
Chang Hu, Qiong Liu, Xuemin Liu, Chunyuan Liao, Pa...
CIVR
2008
Springer
207views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Accumulated motion energy fields estimation and representation for semantic event detection
In this paper, a motion-based approach for detecting highlevel semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be direc...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...