Sciweavers

3516 search results - page 247 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
122
Voted
TCSV
2008
124views more  TCSV 2008»
15 years 3 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
134
Voted
MDM
2001
Springer
148views Communications» more  MDM 2001»
15 years 8 months ago
An Agent-Based Architecture Using XML for Mobile Federated Database Systems
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
Carlos Sánchez, Le Gruenwald
157
Voted
DAWAK
2006
Springer
15 years 7 months ago
A Versioning Management Model for Ontology-Based Data Warehouses
More and more integration systems use ontologies to solve the problem of semantic heterogeneities between autonomous databases. To automate the integration process, a number of the...
Dung Nguyen Xuan, Ladjel Bellatreche, Guy Pierra
178
Voted
EMSOFT
2008
Springer
15 years 4 months ago
On the interplay of dynamic voltage scaling and dynamic power management in real-time embedded applications
Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM) are two popular techniques commonly employed to save energy in real-time embedded systems. DVS policies aim at red...
Vinay Devadas, Hakan Aydin
159
Voted
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
16 years 19 days ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters