Sciweavers

1156 search results - page 117 / 232
» The PENG System: Practice and Experience
Sort
View
ICCSA
2007
Springer
15 years 5 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
ICWL
2007
Springer
15 years 5 months ago
Discovery of Educational Objective on E-Learning Resource: A Competency Approach
It is indeed important to implement e-Learning platforms for education and training purposes in a variety of domains. However, facing the enormous amount of learning resources, gui...
Shi-Ming Huang, Hsiang-Yuan Hsueh, Jing-Shiuan Hua
REFSQ
2007
Springer
15 years 5 months ago
Towards a Tomographic Framework for Structured Observation of Communicative Behaviour in Hospital Wards
Abstract. The research presented in this paper investigates how observation of information- and communication-intensive work in hospital wards can be used to produce requirements f...
Inger Dybdahl Sørby, Øystein Nytr&os...
SAINT
2006
IEEE
15 years 5 months ago
An Application Gateway to Deploy High-quality Video Communications in Various Network Environments
Video communication is being popular by spreading broadband networks. Realization of this kind of communications is important to deploy IPv6. However, many almost of commercial vi...
Takashi Kishida, Kaori Maeda, Eitaro Kohno, Yoshia...
ACSAC
2005
IEEE
15 years 5 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...