Sciweavers

1780 search results - page 141 / 356
» Polymorphic Contention Management
Sort
View
MINENET
2005
ACM
14 years 3 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
MM
2005
ACM
98views Multimedia» more  MM 2005»
14 years 3 months ago
Personal media sharing and authoring on the web
In this paper, we propose a novel system working on the Web for personal media sharing and authoring. Three primary technologies enable this end-to-end system, including scalable ...
Xian-Sheng Hua, Shipeng Li
WISA
2004
Springer
14 years 3 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...
CCS
2003
ACM
14 years 3 months ago
Print signatures for document authentication
We present a novel solution for authenticating printed paper documents by utilizing the inherent non–repeatable randomness existing in the printing process. For a document print...
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
HOTOS
1999
IEEE
14 years 2 months ago
Caching Documents with Active Properties
Caching in the Placeless Documents system poses new challenges because users can attach active properties to documents. Active properties can modify the document's content as...
Eyal de Lara, Karin Petersen, Douglas B. Terry, An...