Sciweavers

100 search results - page 19 / 20
» Cryptographic measures in information hiding
Sort
View
SPATIALCOGNITION
2000
Springer
13 years 9 months ago
Interactive Layout Generation with a Diagrammatic Constraint Language
The paper analyzes a diagrammatic reasoning problem that consists in finding a graphical layout which simultaneously satisfies a set of constraints expressed in a formal language a...
Christoph Schlieder, Cornelius Hagen
SIGSOFT
2008
ACM
14 years 6 months ago
Extended exceptions for contingencies and their implications for the engineering process
We observed a general problem of sequential programs, which often results in design and programming errors in industrial software engineering projects, and propose a solution appr...
Thorsten van Ellen, Wilhelm Hasselbring
CCS
2006
ACM
13 years 9 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 5 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
VEE
2005
ACM
174views Virtualization» more  VEE 2005»
13 years 11 months ago
PDS: a virtual execution environment for software deployment
The Progressive Deployment System (PDS) is a virtual execution environment and infrastructure designed specifically for deploying software, or “assets”, on demand while enabli...
Bowen Alpern, Joshua S. Auerbach, Vasanth Bala, Th...