One of the solutions to deter copyright violations consists of embedding hard to detect watermarks in digital media. Current developments have focused on how to embed watermarks, ...
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Distributed coding at the hidden layer of a multi-layer perceptron (MLP) endows the network with memory compression and noise tolerance capabilities. However, an MLP typically req...
Gail A. Carpenter, Boriana L. Milenova, Benjamin W...
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale compu...