Sciweavers

441 search results - page 68 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
DRM
2005
Springer
15 years 5 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 4 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
ICCV
2009
IEEE
16 years 4 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
JSAC
2010
172views more  JSAC 2010»
14 years 10 months ago
Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks
—Wireless Multimedia Sensor Networks (WMSNs) are distributed systems of wirelessly networked devices that allow retrieving video and audio streams, still images, and scalar senso...
Tommaso Melodia, Ian F. Akyildiz
COLCOM
2009
IEEE
15 years 4 months ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño