Sciweavers

18374 search results - page 73 / 3675
» Applications for data hiding
Sort
View
ICPP
2003
IEEE
15 years 10 months ago
Enabling Partial Cache Line Prefetching Through Data Compression
Hardware prefetching is a simple and effective technique for hiding cache miss latency and thus improving the overall performance. However, it comes with addition of prefetch buff...
Youtao Zhang, Rajiv Gupta
IH
1998
Springer
15 years 9 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
PET
2010
Springer
15 years 9 months ago
Privacy-Preserving Queries over Relational Databases
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Femi G. Olumofin, Ian Goldberg
AAAI
1997
15 years 6 months ago
Query Optimization Using Local Completeness
We consider the problem of query plan optimization in information brokers. Information brokers are programs that facilitate access to collections of information sources by hiding ...
Oliver M. Duschka
ICCS
2007
Springer
15 years 11 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong