Sciweavers

666 search results - page 29 / 134
» Fair watermarking techniques
Sort
View
SSWMC
2004
14 years 11 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
EUROSYS
2010
ACM
15 years 7 months ago
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling
As organizations start to use data-intensive cluster computing systems like Hadoop and Dryad for more applications, there is a growing need to share clusters between users. Howeve...
Matei Zaharia, Dhruba Borthakur, Joydeep Sen Sarma...
MM
2000
ACM
112views Multimedia» more  MM 2000»
15 years 2 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 4 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
CORR
2002
Springer
122views Education» more  CORR 2002»
14 years 9 months ago
Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques
Abstract--In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiat...
Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy