Sciweavers

2493 search results - page 419 / 499
» A survey of network virtualization
Sort
View
IWDW
2004
Springer
15 years 3 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
MMB
2004
Springer
120views Communications» more  MMB 2004»
15 years 3 months ago
Equilibrium Market Prices for Multi-Period Auctions of Internet Resources
Auctions are a well-established mechanism for efficient allocation of scarce resources and as such have already become a standard approach for pricing QoS-enabled future Internet ...
Peter Reichl, Stefan Wrzaczek
SG
2004
Springer
15 years 3 months ago
Implementation of ActiveCube as an Intuitive 3D Computer Interface
This paper describes in details the implementation of the ActiveCube system. ActiveCube allows users to construct and interact with 3D environments by using physical cubes as bi-di...
Ryoichi Watanabe, Yuichi Itoh, Michihiro Kawai, Yo...
IEEEAMS
2003
IEEE
15 years 3 months ago
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...
IEEEAMS
2003
IEEE
15 years 3 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...