Sciweavers

8023 search results - page 1539 / 1605
» Internet Technology
Sort
View
MDM
2009
Springer
269views Communications» more  MDM 2009»
15 years 12 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
INFOCOM
2007
IEEE
15 years 11 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
CIKM
2007
Springer
15 years 11 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
ISW
2007
Springer
15 years 11 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
ISCAS
2006
IEEE
206views Hardware» more  ISCAS 2006»
15 years 11 months ago
JPEG2000 image coding system theory and applications
JPEG2000, the new standard for still image coding, Quantization, user defined wavelets, arbitrary wavelet provides a new framework and an integrated toolbox to better decomposition...
Athanassios N. Skodras, Touradj Ebrahimi
« Prev « First page 1539 / 1605 Last » Next »