Sciweavers

303 search results - page 54 / 61
» Improving conflict resolution in model versioning systems
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICIP
2003
IEEE
15 years 11 months ago
Prescient R-D optimized packet dependency management for low-latency video streaming
We present an improved, prescient, scheme to deliver pre-encoded video streams at very low latency. We dynamically manage the prediction dependency for a group of packets using a ...
Yi J. Liang, Bernd Girod
ER
2007
Springer
80views Database» more  ER 2007»
15 years 3 months ago
From Declarative to Imperative UML/OCL Operation Specifications
An information system maintains a representation of the state of the domain in its Information Base (IB). The state of the IB changes due to the execution of the operations defined...
Jordi Cabot
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 2 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
NSDI
2010
14 years 11 months ago
MapReduce Online
MapReduce is a popular framework for data-intensive distributed computing of batch jobs. To simplify fault tolerance, many implementations of MapReduce materialize the entire outp...
Tyson Condie, Neil Conway, Peter Alvaro, Joseph M....