Abstract. For video adaptation in universal multimedia access systems, video contents have to be transcoded according to the requirements of network bandwidth and the performance o...
June-Sok Lee, Goo-Rak Kwon, Jae-Won Kim, Kyung-Hoo...
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
For some years, our group at FX Palo Alto Laboratory has been developing technologies to support meeting recording, collaboration, and videoconferencing. This paper presents severa...
Jonathan Foote, Qiong Liu, Don Kimber, Patrick Chi...
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...