Sciweavers

2388 search results - page 427 / 478
» Kernel information embeddings
Sort
View
RTS
2006
84views more  RTS 2006»
15 years 14 days ago
Improving WCET by applying worst-case path optimizations
It is advantageous to perform compiler optimizations that attempt to lower the worst-case execution time (WCET) of an embedded application since tasks with lower WCETs are easier ...
Wankang Zhao, William C. Kreahling, David B. Whall...
82
Voted
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 14 days ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 14 days ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
109
Voted
TIFS
2008
137views more  TIFS 2008»
15 years 13 days ago
Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform
This paper presents a hierarchical watermarking framework for semiregular meshes. Three blind watermarks are inserted in a semiregular mesh with different purposes: a geometrically...
Kai Wang, Guillaume Lavoué, Florence Denis,...
114
Voted
CIE
2005
Springer
15 years 13 days ago
Atomic actions -- molecular experience: theory of pervasive gaming
The attempt of this paper is to describe and analyze the formalisms of pervasive games and pervasive gaming (PG). As the title indicates, PG consists of atomic entities that never...
Bo Kampmann Walther