Sciweavers

981 search results - page 155 / 197
» Semantics-aware trace analysis
Sort
View
ICICS
2003
Springer
15 years 7 months ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
ISCIS
2003
Springer
15 years 7 months ago
Virtual Interval Caching Scheme for Interactive Multimedia Streaming Workload
Abstract. We carefully believe that server workload for interactive multimedia service exhibits different characteristics from legacy application, e.g. ftp server, web server, ASP...
Kyoungwoon Cho, Yeonseung Ryu, Youjip Won, Kern Ko...
HASE
2002
IEEE
15 years 7 months ago
Coyote: An XML-Based Framework for Web Services Testing
Web services received significant attention recently and several important web service platforms such as .NET are now available. The testing and evaluation of web services are imp...
Wei-Tek Tsai, Raymond A. Paul, Weiwei Song, Zhibin...
INFOCOM
2002
IEEE
15 years 6 months ago
Clock Synchronization Algorithms for Network Measurements
Abstract—Packet delay traces are important measurements for analyzing end-to-end performance and for designing traffic control algorithms in computer networks. Due to the fact t...
Li Zhang, Zhen Liu, Cathy H. Xia
125
Voted
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 6 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys