Sciweavers

381 search results - page 23 / 77
» host 2008
Sort
View
JEI
2008
129views more  JEI 2008»
13 years 6 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...
TPDS
2010
103views more  TPDS 2010»
13 years 6 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
NSDI
2008
13 years 10 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta
AIRWEB
2008
Springer
13 years 9 months ago
Web spam identification through content and hyperlinks
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as we...
Jacob Abernethy, Olivier Chapelle, Carlos Castillo
BMCBI
2008
112views more  BMCBI 2008»
13 years 7 months ago
Predicting the Interactome of Xanthomonas oryzae pathovar oryzae for target selection and DB service
Background: Protein-protein interactions (PPIs) play key roles in various cellular functions. In addition, some critical inter-species interactions such as host-pathogen interacti...
Jeong-Gu Kim, Daeui Park, Byoung-Chul Kim, Seong-W...