Sciweavers

986 search results - page 128 / 198
» Protecting the Intranet Against
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
ICIP
2005
IEEE
14 years 9 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
ICIP
2004
IEEE
14 years 9 months ago
Efficient path aggregation and error control for video streaming
This paper presents an efficient multiplexing and error control system to improve streaming video performance over path aggregates. While providing the application with increased ...
Omesh Tickoo, Shivkumar Kalyanaraman, John W. Wood...
WWW
2008
ACM
14 years 8 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
HPCA
2009
IEEE
14 years 8 months ago
Voltage emergency prediction: Using signatures to reduce operating margins
Inductive noise forces microprocessor designers to sacrifice performance in order to ensure correct and reliable operation of their designs. The possibility of wide fluctuations i...
Vijay Janapa Reddi, Meeta Sharma Gupta, Glenn H. H...