Sciweavers

2699 search results - page 487 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
COMSWARE
2008
IEEE
14 years 2 months ago
A reality check on sip-based streaming applications on the next generation mobile test network
— The telecom and the internet world is converging towards all-IP network architecture and the operators are keen to provide innovative multimedia services coupled with advanced ...
Chitra Balakrishna, Khalid Al-Begain
MSWIM
2004
ACM
14 years 1 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...
ICPR
2000
IEEE
14 years 8 months ago
Content-Based Watermarking Model
In this paper, we propose a new general additive watermarking model based on the content of digital images, called as CBWM (Content-Based Watermarking Model). It provides a common...
Ruizhen Liu, Tieniu Tan
CHI
2010
ACM
14 years 2 months ago
Newport: enabling sharing during mobile calls
Newport is a collaborative application for sharing context (e.g. location) and content (e.g. photos and notes) during mobile phone calls. People can share during a phone call and ...
Junius Gunaratne, A. J. Bernheim Brush
ICDE
2009
IEEE
124views Database» more  ICDE 2009»
14 years 2 months ago
An Architecture for Regulatory Compliant Database Management
— Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These...
Soumyadeb Mitra, Marianne Winslett, Richard T. Sno...