Sciweavers

3919 search results - page 638 / 784
» Modelling Dynamic Forgetting in Distributed Information Syst...
Sort
View
134
Voted
CIKM
2003
Springer
15 years 7 months ago
Queueing analysis of relational operators for continuous data streams
Currently, stream data processing is an active area of research, which includes everything from algorithms and architectures for stream processing to modelling and analysis of var...
Qingchun Jiang, Sharma Chakravarthy
131
Voted
ALGOSENSORS
2007
Springer
15 years 8 months ago
Counting Targets with Mobile Sensors in an Unknown Environment
Abstract. We consider the problem of counting the number of indistinguishable targets using a simple binary sensing model. Our setting includes an unknown number of point targets i...
Beat Gfeller, Matús Mihalák, Subhash...
129
Voted
ICIW
2009
IEEE
15 years 9 months ago
Paircoding: Improving File Sharing Using Sparse Network Codes
BitTorrent and Practical Network Coding are efficient methods for sharing files in a peer-to-peer network. Both face the problem to distribute a given file using peers with dif...
Christian Ortolf, Christian Schindelhauer, Arne Va...
111
Voted
DRM
2003
Springer
15 years 7 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
110
Voted
TCSV
2008
124views more  TCSV 2008»
15 years 2 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang