Sciweavers

29 search results - page 2 / 6
» Beyond the Box
Sort
View
65
Voted
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
15 years 3 months ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
DRM
2003
Springer
15 years 2 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
DATE
2002
IEEE
136views Hardware» more  DATE 2002»
15 years 2 months ago
Beyond UML to an End-of-Line Functional Test Engine
In this paper, we analyze the use of UML as a starting point to go from design issues to end of production testing of complex embedded systems. The first point is the analysis of ...
Andrea Baldini, Alfredo Benso, Paolo Prinetto, Ser...
99
Voted
IAT
2009
IEEE
15 years 4 months ago
CubanSea: Cluster-Based Visualization of Search Results
—In recent years, there has been a move toward supporting the human element of Web search beyond a simple query box and a ranked list of search results. In this paper, we present...
Matthias Tilsner, Orland Hoeber, Adrian Fiech
ITPRO
2007
101views more  ITPRO 2007»
14 years 9 months ago
Beyond Search: Content Applications
Federation of Abstracting and Information Services presentation (“TheThomsonTransformation: Remaking a Global 500 Company,” http://www. nfais.org/TurnerNFAIS06.ppt). Now conten...
Stephen Buxton