Sciweavers

381 search results - page 15 / 77
» host 2008
Sort
View
TCSV
2008
124views more  TCSV 2008»
13 years 7 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
ICC
2008
IEEE
143views Communications» more  ICC 2008»
14 years 2 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
SUTC
2008
IEEE
14 years 1 months ago
PNECOS: A Peer-to-Peer Network Coding Streaming System
Multimedia streaming service, such as IPTV and VoD, is one of killer applications in 4G network. Exploiting well resources of end hosts to extend the service scalability of a medi...
Tein-Yaw Chung, Chih-Cheng Wang, Yung-Mu Chen, Yan...
AINA
2008
IEEE
14 years 2 months ago
A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks
In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the...
Julien Haillot, Frédéric Guidec
ICASSP
2008
IEEE
14 years 2 months ago
An audio watermarking method based on molecular matching pursuit
In this paper we introduce a new watermarking model combining a joint time frequency (TF) representation using the molecular matching pursuit (MMP) algorithm and a psychoacoustic ...
Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana