Sciweavers

18374 search results - page 70 / 3675
» Applications for data hiding
Sort
View
CSREASAM
2006
15 years 6 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
USENIX
1994
15 years 6 months ago
Splicing UNIX into a Genome Mapping Laboratory
The Whitehead Institute/MIT Center for Genome Research is responsible for a number of large genome mapping efforts, the scale of which create problems of data and workflow managem...
Lincoln Stein, Andre Marquis, Robert Dredge, Mary ...
HPCA
1998
IEEE
15 years 9 months ago
Comparative Evaluation of Latency Tolerance Techniques for Software Distributed Shared Memory
A key challenge in achieving high performance on software DSM systems is overcoming their relatively large communication latencies. In this paper, we consider two techniques which...
Todd C. Mowy, Charles Q. C. Chan, Adley K. W. Lo
JOT
2006
185views more  JOT 2006»
15 years 5 months ago
Empirical Study of Object-Oriented Metrics
The increasing importance of software measurement has led to development of new software measures. Many metrics have been proposed related to various constructs like class, coupli...
K. K. Aggarwal, Yogesh Singh, Arvinder Kaur, Ruchi...