Sciweavers

1840 search results - page 268 / 368
» The Capacity of String-Duplication Systems
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 9 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
ALGORITHMICA
2005
84views more  ALGORITHMICA 2005»
13 years 9 months ago
Optimal Read-Once Parallel Disk Scheduling
An optimal prefetching and I/O scheduling algorithm L-OPT, for parallel I/O systems, using a read-once model of block references is presented. The algorithm uses knowledge of the n...
Mahesh Kallahalla, Peter J. Varman
JCM
2007
76views more  JCM 2007»
13 years 9 months ago
On the Tradeoff Between Blocking and Dropping Probabilities in Multi-cell CDMA Networks
— This paper is a sequel of previous work, in which we proposed a model and computational technique to calculate the Erlang capacity of a single CDMA cell that supports elastic s...
Gábor Fodor, Miklós Telek
JSAC
2007
78views more  JSAC 2007»
13 years 9 months ago
VMesh: Distributed Segment Storage for Peer-to-Peer Interactive Video Streaming
Abstract—Provisioning random access functions in peer-topeer on-demand video streaming is challenging, due to not only the asynchronous user interactivity but also the unpredicta...
Wai-Pun Ken Yiu, Xing Jin, Shueng-Han Gary Chan
COMCOM
2000
148views more  COMCOM 2000»
13 years 9 months ago
Advanced service provisioning based on mobile agents
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Peyman Farjami, Carmelita Görg, Frank Bell