Sciweavers

610 search results - page 102 / 122
» Predicate-Based Key Exchange
Sort
View
ECIS
2001
15 years 3 months ago
Towards sustainable quality of service in interconnection agreements: Implications from information asymmetry
This paper analyses the structure of the Internet marketplace and the business relationships of key players involved in network services provision. A brief overview of existing pr...
Ioanna D. Constantiou, Nikolaos A. Mylonopoulos
SSWMC
2004
15 years 3 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 3 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
117
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
A mobile peer-to-peer system for opportunistic content-centric networking
In this work we present a middleware architecture for a mobile peer-to-peer content distribution system. Our architecture allows wireless content dissemination between mobile node...
Ólafur Ragnar Helgason, Emre A. Yavuz, Sylv...
113
Voted
HAPTICS
2008
IEEE
15 years 2 months ago
Efficient Transport Protocol for Networked Haptics Applications
The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. Th...
Raul Wirz, Manuel Ferre, Raúl Marín,...