Sciweavers

372 search results - page 66 / 75
» p2p 2008
Sort
View
ICIP
2008
IEEE
14 years 9 months ago
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximizatio
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
ACISICIS
2008
IEEE
14 years 1 months ago
SIMPA: A SIP-Based Mobile Payment Architecture
In recent years, many Mobile Payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance and adoption of MP technologies is to de...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
C5
2008
IEEE
14 years 1 months ago
MediaDART: A Decentralized Framework for Sharing Multimedia Content
This paper provides an overview of MediaDART, a framework for building online services for distributing and sharing digital media. Inspired by the participative model of Web 2.0, ...
Maurizio Agelli, Orlando Murru
ICASSP
2008
IEEE
14 years 1 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
ICPADS
2008
IEEE
14 years 1 months ago
Delaunay State Management for Large-Scale Networked Virtual Environments
Peer-to-Peer (P2P) networks have been proposed as a promising approach to create more scalable Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probabil...
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang