Sciweavers

620 search results - page 93 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak
70
Voted
ATAL
2005
Springer
15 years 3 months ago
Argument-based negotiation in a social context
Argumentation-based negotiation (ABN) provides agents with an effective means to resolve conflicts within a multi-agent society. However, to engage in such argumentative encounter...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
ESWS
2005
Springer
15 years 3 months ago
RDFSculpt: Managing RDF Schemas Under Set-Like Semantics
The Semantic Web is an extension of the current Web in which information is given well-defined meaning to support effective data discovery and integration. The RDF framework is a...
Zoi Kaoudi, Theodore Dalamagas, Timos K. Sellis
ICIAR
2005
Springer
15 years 3 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
IPSN
2005
Springer
15 years 3 months ago
A robust architecture for distributed inference in sensor networks
— Many inference problems that arise in sensor networks require the computation of a global conclusion that is consistent with local information known to each node. A large class...
Mark A. Paskin, Carlos Guestrin, Jim McFadden