5,318 Result(s)
-
Chapter and Conference Paper
A unified framework for multicast forwarding
This paper examines the issues of implementation and integration in multicast. A framework for multicast forwarding is presented, which separates multicast forwarding from any associated protocols that may aff...
-
Chapter and Conference Paper
The secure conferencing user agent A tool to provide secure conferencing with Mbone multimedia conferencing applications
This report briefly describes the Secure Conferencing User Agent (SCUA), which provides secure conferencing with privacy and authentication. The SCUA was implemented using the MICE multimedia conferencing appl...
-
Chapter and Conference Paper
Interactive multimedia communications at the presentation layer
A main feature of the next generation's computing software is supporting convenient user interactions. Interactive multimedia presentations that are executed in distributed environments raise some new computer...
-
Chapter and Conference Paper
System for screening objectionable images using Daubechies' wavelets and color histograms
This paper describes WIPETM (Wavelet Image Pornography Elimination), an algorithm capable of classifying an image as objectionable or benign. The algorithm uses a combination of Daubechies' wavelets, normalized c...
-
Chapter and Conference Paper
A redundant hierarchical structure for a distributed continuous media server
The growing number of digital audio and video repositories has resulted in a desperate need for effective techniques to deliver data to users in a timely manner. Due to geographical distribution of users, it i...
-
Chapter
Domain model based hypertext for collaborative authoring
Domain information models reflect the common structural and semantic characteristics of information organization in particular domains. This chapter describes the creation of a domain model based hypertext and...
-
Chapter and Conference Paper
On Zhang's nonrepudiable proxy signature schemes
In 1997, Zhang proposed two new nonrepudiable proxy signature schemes to delegate signing capability. Both schemes claimed to have a property of knowing that a proxy signature is generated by either the origin...
-
Chapter and Conference Paper
A secure intelligent trade agent system
In this paper, a secure intelligent trade agent system is developed. In this system, an intelligent trade agent can be authenticated and supplied certain authorized agent execution environment for it to run by...
-
Chapter and Conference Paper
Classifying objectionable websites based on image content
This paper describes IBCOW (Image-based Classification of Objectionable Websites), a system capable of classifying a website as objectionable or benign based on image content. The system uses WIPEℳ (Wavelet Image...
-
Chapter and Conference Paper
On construction of cumulative secret sharing schemes
Secret sharing schemes are one of the most important primitives in distributed systems. Cumulative secret sharing schemes provide a method to share a secret among a number of participants with arbitrary access...
-
Chapter and Conference Paper
Bounds and constructions for A3-code with multi-senders
We extend authentication codes with arbiter to the scenario where there are multiple senders and none of the participants, including the arbiter, is trusted. In this paper we derive bounds on the probability o...
-
Chapter and Conference Paper
Implementing Sequoia 2000 Benchmark on Shusse-Uo and Its Performance
As an ODBMS, Shusse-Uo is built on Network Of Workstations (NOW). In Shusse-Uo, a storage manager based on distributed shared memory and a persistent programming language for object management are provided. In...
-
Chapter and Conference Paper
A Secure Communication Scheme for Multiagent Systems
In this paper we present a secure communication scheme for multiagent systems. First, we briefly introduce an architecture for multiagent systems, and discuss security problems with such systems. We then prese...
-
Chapter and Conference Paper
A Spatiotemporal Query Processor Based on Simplicial Representation
In spatial databases, efficient filtering of spatial objects using some index is a key issue to improve the retrieval performance R*-tree is a well-known index which can manage points and rectangles. In R*-tre...
-
Chapter and Conference Paper
An Efficient View Maintenance Algorithm for Data Warehousing
We first present a brief analysis of current issues on view maintenance problem for data warehousing. Then, we present an efficient view maintenance algorithm to maintain the materialized view of a data wareho...
-
Chapter and Conference Paper
Distributed Control of Mobile ATM Networks Using CORBA
This paper reports the design, implementation, and performance evaluation of a CORBA based distributed control architecture for mobile ATM networks. The distributed control architecture makes use of open signa...
-
Chapter and Conference Paper
Secure Agent-Mediated Mobile Payment
Mobile devices usually have too limited and expensive communication capacity to meet consistent connection requirement of online payment protocols such as SET. Mobile agent approaches have been proposed by SET...
-
Chapter and Conference Paper
A Conceptual Model for the Web
Most documents available over the web conform to the HTML specification. Such documents are hierarchically structured in nature. The existing graph-based or tree-based data models for the web only provide a ve...
-
Chapter and Conference Paper
On Finding Feasible Solutions to the Group Multicast Routing Problem
Group multicast routing problem (GMRP) is a generalization of multicasting whereby every member of the group is allowed to multicast messages to other members from the same group. The routing problem in this c...
-
Chapter and Conference Paper
Priority Based Multiple Access for Service Differentiation in Wireless Ad-Hoc Networks
This article describes the Priority Based Multiple Access (PriMA) protocol, a new medium access control (MAC) protocol for single-channel ad-hoc networks. Unlike previously proposed protocols, PriMA takes into...