Abstract—Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing (overt) data transmissions to carry ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
An increasing number of computationally enhanced objects is distributed around us in physical space, which are equipped – or at least can be provided – with sensors for measuri...
: Business information systems provide computer support for decision making across huge data sets. Smart Items are miniaturized computer and sensing systems embedded into physical ...
Christian Decker, Clemens van Dinther, Jens Mü...
An algorithm is presented for the geometric analysis of an algebraic curve f(x, y) = 0 in the real affine plane. It computes a cylindrical algebraic decomposition (CAD) of the pla...