Sciweavers

666 search results - page 109 / 134
» Fair watermarking techniques
Sort
View
NSDI
2004
14 years 11 months ago
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks
Currently, researchers designing and implementing largescale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experiment...
Adolfo Rodriguez, Charles Edwin Killian, Sooraj Bh...
DIMVA
2009
14 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
COMCOM
2008
83views more  COMCOM 2008»
14 years 10 months ago
Hierarchical multidimensional search in peer-to-peer networks
We propose a P2P search solution, called EZSearch, that enables efficient multidimensional search for remotely located contents that best match the search criteria. EZSearch is a h...
Duc A. Tran, T. Nguyen
EOR
2008
109views more  EOR 2008»
14 years 10 months ago
Basin-wide cooperative water resources allocation
The Cooperative Water Allocation Model (CWAM) is designed within a general mathematical programming framework for modeling equitable and efficient water allocation among competing...
Lizhong Wang, Liping Fang, Keith W. Hipel
CORR
2006
Springer
102views Education» more  CORR 2006»
14 years 10 months ago
A library of Taylor models for PVS automatic proof checker
We present in this paper a library to compute with Taylor models, a technique extending interval arithmetic to reduce decorrelation and to solve differential equations. Numerical s...
Francisco Cháves, Marc Daumas