Sciweavers

33 search results - page 2 / 7
» itiis 2008
Sort
View
ITIIS
2010
183views more  ITIIS 2010»
13 years 3 months ago
Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting
To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embed...
Hee Joon Hwang, Hyoung Joong Kim, Vasiliy Sachnev,...
ITIIS
2008
149views more  ITIIS 2008»
13 years 3 months ago
Sharing e-Learning Object Metadata Using ebXML Registries for Semantic Grid Computing
To facilitate the processes of e-learning resource description, discovery and reuse, e-learning objects should be appropriately described and classified using standard metadata th...
Hyoung Do Kim
ITIIS
2008
110views more  ITIIS 2008»
13 years 4 months ago
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Sun Ho Kim, Byeong-hee Roh
ITIIS
2008
153views more  ITIIS 2008»
13 years 4 months ago
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks
In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduc...
Abedelaziz Mohaisen, DaeHun Nyang, Tamer AbuHmed
ITIIS
2008
91views more  ITIIS 2008»
13 years 4 months ago
Towards a Server-Centric Interaction Architecture for Wireless Applications
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...