Sciweavers

7554 search results - page 1462 / 1511
» Process Diagnostics: A Method Based on Process Mining
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 9 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
148
Voted
IMC
2004
ACM
15 years 9 months ago
Constraint-based geolocation of internet hosts
— Geolocation of Internet hosts enables a diverse and interesting new class of location-aware applications. Previous measurement-based approaches use reference hosts, called land...
Bamba Gueye, Artur Ziviani, Mark Crovella, Serge F...
MM
2004
ACM
147views Multimedia» more  MM 2004»
15 years 9 months ago
Implementation and evaluation of EXT3NS multimedia file system
The EXT3NS is a scalable file system designed to handle video streaming workload in large-scale on-demand streaming services. It is based on a special H/W device, called Network-S...
Baik-Song Ahn, Sung-Hoon Sohn, Chei-Yol Kim, Gyu-I...
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 9 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
MM
2004
ACM
192views Multimedia» more  MM 2004»
15 years 9 months ago
Communicating everyday experiences
In this paper, we present our approach to the problem of communicating everyday experiences. This is a challenging problem, since media from everyday events are unstructured, and ...
Preetha Appan, Hari Sundaram, David Birchfield
« Prev « First page 1462 / 1511 Last » Next »