Sciweavers

120 search results - page 15 / 24
» Data Hiding: Current Status and Key Issues
Sort
View
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 4 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
61
Voted
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
15 years 3 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
115
Voted
ANOR
2010
139views more  ANOR 2010»
14 years 7 months ago
Some operations research methods for analyzing protein sequences and structures
Operations Research is probably one of the most successful fields of applied mathematics used in Economics, Physics, Chemistry, almost everywhere onehastoanalyzehugeamountsofdata.L...
Piotr Lukasiak, Jacek Blazewicz, Maciej Milostan
72
Voted
EAAI
2008
113views more  EAAI 2008»
14 years 9 months ago
Airlift mission monitoring and dynamic rescheduling
We describe the Flight Manager Assistant (FMA), a prototype system, designed to support real-time management of airlift operations at the USAF Air Mobility Command (AMC). In curre...
David E. Wilkins, Stephen F. Smith, Laurence A. Kr...
OZCHI
2005
ACM
15 years 3 months ago
Technology for the humdrum: trajectories, interactional needs and a care setting
We report on a care setting where staff looking after ex-psychiatric patients were supported by mobile and stationery communications technology (e.g. mobile phones, a messaging sy...
Connor Graham, Keith Cheverst, Mark Rouncefield