Sciweavers

2827 search results - page 107 / 566
» Data Hiding in Video
Sort
View
ICCV
2005
IEEE
15 years 12 months ago
Detecting Irregularities in Images and in Video
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term &qu...
Oren Boiman, Michal Irani
SRDS
2007
IEEE
15 years 4 months ago
Evaluating Byzantine Quorum Systems
Replication is a mechanism extensively used to guarantee the availability and good performance of data storage services. Byzantine Quorum Systems (BQS) have been proposed as a sol...
Wagner Saback Dantas, Alysson Neves Bessani, Joni ...
CC
2005
Springer
106views System Software» more  CC 2005»
15 years 3 months ago
Source-Level Debugging for Multiple Languages with Modest Programming Effort
Abstract. We present techniques that enable source-level debugging for multiple languages at the cost of only modest programming effort. The key idea is to avoid letting debugging ...
Sukyoung Ryu, Norman Ramsey
EUC
2005
Springer
15 years 3 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
WEBI
2004
Springer
15 years 3 months ago
Querying and Updating a Context-Aware Service Directory in Mobile Environments
Several interesting research directions materialize through the convergence of mobile computing and service-oriented computing. As mobile devices keep getting smaller, cheaper and...
Christos Doulkeridis, Michalis Vazirgiannis