Sciweavers

2007 search results - page 166 / 402
» SPECTRUM
Sort
View
IH
2005
Springer
15 years 9 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...
RWEB
2005
Springer
15 years 9 months ago
Web and Semantic Web Query Languages: A Survey
A number of techniques have been developed to facilitate powerful data retrieval on the Web and Semantic Web. Three categories of Web query languages can be distinguished, accordin...
James Bailey, François Bry, Tim Furche, Seb...
SIGOPSE
2004
ACM
15 years 9 months ago
Impeding attrition attacks in P2P systems
—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...
DEXAW
2003
IEEE
70views Database» more  DEXAW 2003»
15 years 9 months ago
XenoTrust: Event-based distributed trust management
This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks t...
Boris Dragovic, Evangelos Kotsovinos, Steven Hand,...
ISCAS
2003
IEEE
108views Hardware» more  ISCAS 2003»
15 years 9 months ago
Co-existence of chaos-based and conventional digital communication systems
This paper studies the performance of selected chaos-based communication systems whose spectrum overlaps with that of conventional narrowband systems. Such a scenario may occur in...
Francis Chi-Moon Lau, C. K. Tse