Sciweavers

2421 search results - page 332 / 485
» Message from the Editor-in-Chief
Sort
View
CEAS
2005
Springer
15 years 3 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
ICIP
2005
IEEE
15 years 11 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
ICIP
2002
IEEE
15 years 11 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
ICDE
2008
IEEE
103views Database» more  ICDE 2008»
15 years 11 months ago
Processing Diagnosis Queries: A Principled and Scalable Approach
Abstract-- Many popular Web sites suffer occasional uservisible problems such as slow responses, blank pages or error messages being displayed, items not being added to shopping ca...
Shivnath Babu, Songyun Duan, Kamesh Munagala
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 11 months ago
Scoop: An Adaptive Indexing Scheme for Stored Data in Sensor Networks
We present the design of Scoop, a system for indexing and querying stored data in sensor networks. Scoop works by collecting statistics about the rate of queries and distribution ...
Thomer M. Gil, Samuel Madden