Sciweavers

1757 search results - page 209 / 352
» Secure Content Validation
Sort
View
COMCOM
2006
123views more  COMCOM 2006»
14 years 11 months ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka
CSUR
2006
121views more  CSUR 2006»
14 years 11 months ago
A taxonomy of Data Grids for distributed data sharing, management, and processing
Data Grids have been adopted as the next-generation platform by many scientific communities that need to share, access, transport, process and manage large data collections distri...
Srikumar Venugopal, Rajkumar Buyya, Kotagiri Ramam...
CORR
2007
Springer
87views Education» more  CORR 2007»
14 years 11 months ago
Double Sided Watermark Embedding and Detection with Perceptual Analysis
—In our previous work, we introduced a double-sided technique that utilizes but not reject the host interference. Due to its nice property of utilizing but not rejecting the host...
Jidong Zhong, Shangteng Huang
JFP
2002
100views more  JFP 2002»
14 years 11 months ago
A typed representation for HTML and XML documents in Haskell
We define a family of embedded domain specific languages for generating HTML and XML documents. Each language is implemented as a combinator library in Haskell. The generated HTML...
Peter Thiemann
PRL
2008
124views more  PRL 2008»
14 years 11 months ago
Modeling human color categorization
Color matching in Content-Based Image Retrieval is done using a color space and measuring distances between colors. Such an approach yields nonintuitive results for the user. We i...
Egon L. van den Broek, Theo E. Schouten, P. M. F. ...