Sciweavers

77 search results - page 12 / 16
» The many colors of multimedia security
Sort
View
TCC
2009
Springer
158views Cryptology» more  TCC 2009»
14 years 8 months ago
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
The concept of witness-hiding suggested by Feige and Shamir is a natural relaxation of zero-knowledge. In this paper we identify languages and distributions for which many known co...
Iftach Haitner, Alon Rosen, Ronen Shaltiel
INFOCOM
2009
IEEE
14 years 2 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
FI
2010
143views more  FI 2010»
13 years 2 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...
IEEEMM
2002
291views more  IEEEMM 2002»
13 years 7 months ago
Semantic Annotation of Sports Videos
ion when we annotate content. This therefore requires us to investigate and model video semantics. Because of the type and volume of data, general-purpose approaches are likely to ...
Jürgen Assfalg, Marco Bertini, Carlo Colombo,...
MIR
2010
ACM
207views Multimedia» more  MIR 2010»
13 years 5 months ago
Learning to rank for content-based image retrieval
In Content-based Image Retrieval (CBIR), accurately ranking the returned images is of paramount importance, since users consider mostly the topmost results. The typical ranking st...
Fabio F. Faria, Adriano Veloso, Humberto Mossri de...