Sciweavers

230 search results - page 17 / 46
» host 2009
Sort
View
GLOBECOM
2009
IEEE
13 years 5 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
ICMCS
2009
IEEE
134views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Robust lossless data hiding based on block gravity center for selective authentication
Reversible or lossless data hiding enables host media to be restored from marked media without any loss of host information. However, since most of existing lossless data hiding m...
Kyung-Su Kim, Min-Jeong Lee, Young-Ho Suh, Heung-K...
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 5 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
14 years 2 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 2 months ago
Celebrating Diversity in Volunteer Computing
The computing resources in a volunteer computing system are highly diverse in terms of software and hardware type, speed, availability, reliability, network connectivity, and othe...
David P. Anderson, Kevin Reed