Sciweavers

3953 search results - page 528 / 791
» Enhancing web accessibility
Sort
View
142
Voted
ICIP
2010
IEEE
15 years 2 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
150
Voted
IWCMC
2010
ACM
15 years 2 months ago
Network mobility support in PMIPv6 network
In this paper, we propose a network mobility supporting scheme (N-NEMO) in Proxy Mobile IPv6 (PMIPv6) network, which is an issue still up in the air for the PMIPv6. In the N-NEMO,...
Zhiwei Yan, Sidong Zhang, Huachun Zhou, Hongke Zha...
IEEEIA
2009
15 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
IJOCI
2010
163views more  IJOCI 2010»
15 years 2 months ago
An Experimental Performance Comparison for Indexing Mobile Objects on the Plane
We present a time-efficient approach to index objects moving on the plane to efficiently answer range queries about their future positions. Each object is moving with non small ve...
Spyros Sioutas, George Papaloukopoulos, Kostas Tsi...
NETWORK
2010
92views more  NETWORK 2010»
14 years 11 months ago
On the use of RTP for monitoring and fault isolation in IPTV
Since the first operational IPTV networks have been deployed, service providers and operators have struggled to make their subscribers happy and satisfied with their services. To ...
Ali C. Begen, Colin Perkins, Jörg Ott