Sciweavers

1033 search results - page 20 / 207
» Redistribution in distributed Ada
Sort
View
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
14 years 3 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
JIPS
2010
110views more  JIPS 2010»
13 years 4 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
ICDE
2002
IEEE
116views Database» more  ICDE 2002»
14 years 11 months ago
SCADDAR: An Efficient Randomized Technique to Reorganize Continuous Media Blocks
Scalable storage architectures allow for the addition of disks to increase storage capacity and/or bandwidth. In its general form, disk scaling also refers to disk removals when e...
Ashish Goel, Cyrus Shahabi, Shu-Yuen Didi Yao, Rog...
VLDB
2005
ACM
132views Database» more  VLDB 2005»
14 years 10 months ago
Hash-based labeling techniques for storage scaling
Scalable storage architectures allow for the addition or removal of storage devices to increase storage capacity and bandwidth or retire older devices. Assuming random placement of...
Shu-Yuen Didi Yao, Cyrus Shahabi, Per-Åke Larson
INFOCOM
2009
IEEE
14 years 4 months ago
Impacts of Peer Characteristics on P2PTV Networks Scalability
—A P2PTV system allows users to watch live video streams redistributed by other users via a peer-to-peer (P2P) network. In an ideal world, each peer in a P2P network would be abl...
Khaldoon Shami, Damien Magoni, Hyunseok Chang, Wen...