Sciweavers

1604 search results - page 241 / 321
» Development Separation in Lambda-Calculus
Sort
View
SIGOPS
2008
152views more  SIGOPS 2008»
15 years 4 months ago
The Caernarvon secure embedded operating system
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has b...
David C. Toll, Paul A. Karger, Elaine R. Palmer, S...
IJNSEC
2007
161views more  IJNSEC 2007»
15 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 4 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
BMCBI
2005
63views more  BMCBI 2005»
15 years 4 months ago
Individual sequences in large sets of gene sequences may be distinguished efficiently by combinations of shared sub-sequences
Background: Most current DNA diagnostic tests for identifying organisms use specific oligonucleotide probes that are complementary in sequence to, and hence only hybridise with th...
Mark J. Gibbs, John S. Armstrong, Adrian J. Gibbs
JEI
2007
199views more  JEI 2007»
15 years 4 months ago
New benchmark for image segmentation evaluation
Image segmentation and its performance evaluation are very difficult but important problems in computer vision. A major challenge in segmentation evaluation comes from the fundame...
Feng Ge, Song Wang, Tiecheng Liu