A powerful approach to search is to try to learn a distribution of good solutions (in particular of the dependencies between their variables) and use this distribution as a basis ...
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
The empirical findings from an organization, which adopted and implemented ERP, are presented. The focus of this empirical research was to understand the nature and processes of k...
Jimmy C. Huang, Sue Newell, Shan Ling Pan, Robert ...
This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded ...
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani