Sciweavers

3674 search results - page 281 / 735
» Information Dependencies
Sort
View
95
Voted
ACISICIS
2007
IEEE
15 years 7 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
140
Voted
HICSS
2006
IEEE
179views Biometrics» more  HICSS 2006»
15 years 6 months ago
e-Government Integration with Web Services and Alerts: A Case Study on an Emergency Route Advisory System in Hong Kong
Quick and efficient response to emergency is important for every city. This depends on the quality of the dispatch of emergency service to the scene and back to hospital or other ...
Cherrie W. W. Ng, Dickson K. W. Chiu
138
Voted
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 6 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
107
Voted
SIGIR
2006
ACM
15 years 6 months ago
A study of statistical models for query translation: finding a good unit of translation
This paper presents a study of three statistical query translation models that use different units of translation. We begin with a review of a word-based translation model that us...
Jianfeng Gao, Jian-Yun Nie
126
Voted
ICN
2005
Springer
15 years 6 months ago
An Energy Constrained Multi-hop Clustering Algorithm for Wireless Sensor Networks
A wireless sensor network is a new kind of wireless Ad-Hoc network consisting of a large number of small low cost, power constrained sensors deployed in a large area for gathering...
Navin Kumar Sharma, Mukesh Kumar