Skip to main content

previous disabled Page of 266
and
  1. No Access

    Chapter and Conference Paper

    A unified framework for multicast forwarding

    This paper examines the issues of implementation and integration in multicast. A framework for multicast forwarding is presented, which separates multicast forwarding from any associated protocols that may aff...

    Zheng Wang, Jon Crowcroft in Network and Operating System Support for D… (1994)

  2. No Access

    Chapter and Conference Paper

    The secure conferencing user agent A tool to provide secure conferencing with Mbone multimedia conferencing applications

    This report briefly describes the Secure Conferencing User Agent (SCUA), which provides secure conferencing with privacy and authentication. The SCUA was implemented using the MICE multimedia conferencing appl...

    Elfriede Hinsch, Anne Jaegemann in Interactive Distributed Multimedia Systems… (1996)

  3. No Access

    Chapter and Conference Paper

    Interactive multimedia communications at the presentation layer

    A main feature of the next generation's computing software is supporting convenient user interactions. Interactive multimedia presentations that are executed in distributed environments raise some new computer...

    Chung-Ming Huang, Chian Wang in Interactive Distributed Multimedia Systems… (1997)

  4. No Access

    Chapter and Conference Paper

    System for screening objectionable images using Daubechies' wavelets and color histograms

    This paper describes WIPETM (Wavelet Image Pornography Elimination), an algorithm capable of classifying an image as objectionable or benign. The algorithm uses a combination of Daubechies' wavelets, normalized c...

    James Ze Wang, Gio Wiederhold in Interactive Distributed Multimedia Systems… (1997)

  5. No Access

    Chapter and Conference Paper

    A redundant hierarchical structure for a distributed continuous media server

    The growing number of digital audio and video repositories has resulted in a desperate need for effective techniques to deliver data to users in a timely manner. Due to geographical distribution of users, it i...

    Cyrus Shahabi, Mohammad H. Alshayeji in Interactive Distributed Multimedia Systems… (1997)

  6. No Access

    Chapter

    Domain model based hypertext for collaborative authoring

    Domain information models reflect the common structural and semantic characteristics of information organization in particular domains. This chapter describes the creation of a domain model based hypertext and...

    Weigang Wang, Claude Ghaoui, Roy Rada in Intelligent Hypertext (1997)

  7. No Access

    Chapter and Conference Paper

    On Zhang's nonrepudiable proxy signature schemes

    In 1997, Zhang proposed two new nonrepudiable proxy signature schemes to delegate signing capability. Both schemes claimed to have a property of knowing that a proxy signature is generated by either the origin...

    Nam -Yih Lee, Tzonelih Hwang, Chih -Hung Wang in Information Security and Privacy (1998)

  8. Chapter and Conference Paper

    A secure intelligent trade agent system

    In this paper, a secure intelligent trade agent system is developed. In this system, an intelligent trade agent can be authenticated and supplied certain authorized agent execution environment for it to run by...

    X. Yi, X. F. Wang, K. Y. Lam in Trends in Distributed Systems for Electronic Commerce (1998)

  9. No Access

    Chapter and Conference Paper

    Classifying objectionable websites based on image content

    This paper describes IBCOW (Image-based Classification of Objectionable Websites), a system capable of classifying a website as objectionable or benign based on image content. The system uses WIPE (Wavelet Image...

    James Ze Wang, Jia Li, Gio Wiederhold in Interactive Distributed Multimedia Systems… (1998)

  10. No Access

    Chapter and Conference Paper

    On construction of cumulative secret sharing schemes

    Secret sharing schemes are one of the most important primitives in distributed systems. Cumulative secret sharing schemes provide a method to share a secret among a number of participants with arbitrary access...

    Hossein Ghodosi, Josef Pieprzyk, Rei Safavi-Naini in Information Security and Privacy (1998)

  11. No Access

    Chapter and Conference Paper

    Bounds and constructions for A3-code with multi-senders

    We extend authentication codes with arbiter to the scenario where there are multiple senders and none of the participants, including the arbiter, is trusted. In this paper we derive bounds on the probability o...

    Rei Safavi-Naini, Ye**g Wang in Information Security and Privacy (1998)

  12. No Access

    Chapter and Conference Paper

    Implementing Sequoia 2000 Benchmark on Shusse-Uo and Its Performance

    As an ODBMS, Shusse-Uo is built on Network Of Workstations (NOW). In Shusse-Uo, a storage manager based on distributed shared memory and a persistent programming language for object management are provided. In...

    Botao Wang, Hiroyuki Horinokuchi, Susumu Kuroki in Advances in Database Technologies (1999)

  13. No Access

    Chapter and Conference Paper

    A Secure Communication Scheme for Multiagent Systems

    In this paper we present a secure communication scheme for multiagent systems. First, we briefly introduce an architecture for multiagent systems, and discuss security problems with such systems. We then prese...

    Hongxue Wang, Vijay Varadharajan, Yan Zhang in Multiagent Platforms (1999)

  14. No Access

    Chapter and Conference Paper

    A Spatiotemporal Query Processor Based on Simplicial Representation

    In spatial databases, efficient filtering of spatial objects using some index is a key issue to improve the retrieval performance R*-tree is a well-known index which can manage points and rectangles. In R*-tre...

    Hiroyuki Horinokuchi, Botao Wang, Susumu Kuroki in Advances in Database Technologies (1999)

  15. No Access

    Chapter and Conference Paper

    An Efficient View Maintenance Algorithm for Data Warehousing

    We first present a brief analysis of current issues on view maintenance problem for data warehousing. Then, we present an efficient view maintenance algorithm to maintain the materialized view of a data wareho...

    Tok Wang Ling, Ye Liu in Advances in Database Technologies (1999)

  16. No Access

    Chapter and Conference Paper

    Distributed Control of Mobile ATM Networks Using CORBA

    This paper reports the design, implementation, and performance evaluation of a CORBA based distributed control architecture for mobile ATM networks. The distributed control architecture makes use of open signa...

    R. Radhakrishna Pillai, Maitreya Rangnath in Advances in Database Technologies (1999)

  17. No Access

    Chapter and Conference Paper

    Secure Agent-Mediated Mobile Payment

    Mobile devices usually have too limited and expensive communication capacity to meet consistent connection requirement of online payment protocols such as SET. Mobile agent approaches have been proposed by SET...

    X. F. Wang, K. Y. Lam, X. Yi in Multiagent Platforms (1999)

  18. No Access

    Chapter and Conference Paper

    A Conceptual Model for the Web

    Most documents available over the web conform to the HTML specification. Such documents are hierarchically structured in nature. The existing graph-based or tree-based data models for the web only provide a ve...

    Mengchi Liu, Tok Wang Ling in Conceptual Modeling — ER 2000 (2000)

  19. Chapter and Conference Paper

    On Finding Feasible Solutions to the Group Multicast Routing Problem

    Group multicast routing problem (GMRP) is a generalization of multicasting whereby every member of the group is allowed to multicast messages to other members from the same group. The routing problem in this c...

    Ning Wang, Chor ** Low in Networking 2000 Broadband Communications, … (2000)

  20. Chapter and Conference Paper

    Priority Based Multiple Access for Service Differentiation in Wireless Ad-Hoc Networks

    This article describes the Priority Based Multiple Access (PriMA) protocol, a new medium access control (MAC) protocol for single-channel ad-hoc networks. Unlike previously proposed protocols, PriMA takes into...

    Yu Wang, Brahim Bensaou in Mobile and Wireless Communications Networks (2000)

previous disabled Page of 266