Sciweavers

5088 search results - page 913 / 1018
» Rich Internet Applications
Sort
View
INFOCOM
1999
IEEE
15 years 8 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
15 years 8 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara
WETICE
1999
IEEE
15 years 8 months ago
Replacing Copies with Connections: Managing Software across the Virtual Organization
The Internet, the World Wide Web, JavaTM technology, and software components are changing the software business. Activities traditionally constrained by the need for intense infor...
Tobias Murer, Michael L. Van de Vanter
ISW
1999
Springer
15 years 8 months ago
Digital Watermarking Robust Against JPEG Compression
Digital watermarking has been considered as an important technique to protect the copyright of digital content. For a digital watermarking method to be effective, it is essential ...
Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng
ICMCS
1998
IEEE
86views Multimedia» more  ICMCS 1998»
15 years 8 months ago
Virtual Recovery of Excavated Archaeological Finds
This work aims at a virtual recovery of excavated archaeological finds in cyberspace for ancient relic preservation, archaeology research, and multimedia material generation. Many...
Jiang Yu Zheng, Zhong Li Zhang, Norihiro Abe