Sciweavers

210 search results - page 26 / 42
» Research on Data Hiding Capacity
Sort
View
COMCOM
2006
134views more  COMCOM 2006»
13 years 10 months ago
On the deployment of VoIP in Ethernet networks: methodology and case study
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step method...
Khaled Salah
FCSC
2010
92views more  FCSC 2010»
13 years 8 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
DEXA
2010
Springer
187views Database» more  DEXA 2010»
13 years 7 months ago
Pivot Selection Method for Optimizing both Pruning and Balancing in Metric Space Indexes
We researched to try to find a way to reduce the cost of nearest neighbor searches in metric spaces. Many similarity search indexes recursively divide a region into subregions by u...
Hisashi Kurasawa, Daiji Fukagawa, Atsuhiro Takasu,...
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
14 years 2 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
ICAS
2008
IEEE
179views Robotics» more  ICAS 2008»
14 years 4 months ago
Implementation of a Generic Autonomic Framework
—Based on insights from the implementation of commercial products for data-centre resource management, we identified key challenges in the development of cost-effective autonomi...
Radu Calinescu