Sciweavers

13 search results - page 2 / 3
» Reversible Watermarking: Current Status and Key Issues
Sort
View
IH
2007
Springer
13 years 10 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
ICWSM
2010
13 years 5 months ago
Social Intellisense: A Task-Embedded Interface to Folksonomies
We present an application for accessing and creating socially constructed sets of information. Users store and retrieve information, such as bits of text, through the use of "...
Scott Counts, Kristie Fisher, Aaron Hoff
WS
2008
ACM
13 years 4 months ago
OWL 2: The next step for OWL
Since achieving W3C recommendation status in 2004, the Web Ontology Language (OWL) has been successfully applied to many problems in computer science. Practical experience with OW...
Bernardo Cuenca Grau, Ian Horrocks, Boris Motik, B...
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
14 years 4 months ago
The hyperion project: from data integration to data coordination
We present an architecture and a set of challenges for peer database management systems. These systems team up to build a network of nodes (peers) that coordinate at run time most...
Marcelo Arenas, Vasiliki Kantere, Anastasios Kemen...
ICSOC
2007
Springer
13 years 10 months ago
Dynamic Service Provisioning Using GRIA SLAs
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...