Sciweavers

1744 search results - page 207 / 349
» The Steganographic File System
Sort
View
ISMIR
2001
Springer
173views Music» more  ISMIR 2001»
15 years 8 months ago
An Approach Towards A Polyphonic Music Retrieval System
Most research on music retrieval systems is based on monophonic musical sequences. In this paper, we investigate techniques for a full polyphonic music retrieval system. A method ...
Shyamala Doraisamy
129
Voted
CCS
2008
ACM
15 years 6 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
125
Voted
EUROPAR
2008
Springer
15 years 5 months ago
Empirical Analysis of a Large-Scale Hierarchical Storage System
To prepare for future peta- or exa-scale computing, it is important to gain a good understanding on what impacts a hierarchical storage system would have on the performance of data...
Weikuan Yu, Sarp Oral, Shane Canon, Jeffrey S. Vet...
ISCAPDCS
2004
15 years 5 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
CONCURRENCY
2008
99views more  CONCURRENCY 2008»
15 years 4 months ago
TRIBLER: a social-based peer-to-peer system
Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena...
Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno ...