Sciweavers

666 search results - page 90 / 134
» Fair watermarking techniques
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes
— In this paper, we concentrate on opportunistic scheduling for multicast information. We pose the problem as a multicast throughput optimization problem. As a solution we presen...
Ulas C. Kozat
CSFW
2007
IEEE
15 years 4 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
ECML
2007
Springer
15 years 4 months ago
Learning to Classify Documents with Only a Small Positive Training Set
Many real-world classification applications fall into the class of positive and unlabeled (PU) learning problems. In many such applications, not only could the negative training ex...
Xiaoli Li, Bing Liu, See-Kiong Ng
NLDB
2007
Springer
15 years 4 months ago
Automatic Issue Extraction from a Focused Dialogue
Various methodologies for structuring the process of domain modeling have been proposed, but there are few software tools that provide automatic support for the process of construc...
Koen V. Hindriks, Stijn Hoppenbrouwers, Catholijn ...
ICEBE
2006
IEEE
115views Business» more  ICEBE 2006»
15 years 4 months ago
From Commodity to Value: A Privacy-Preserving e-Business Architecture
Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this ...
Yitao Duan, John F. Canny