Sciweavers

237 search results - page 25 / 48
» On information hiding with incomplete information about steg...
Sort
View
PODS
2010
ACM
242views Database» more  PODS 2010»
15 years 2 months ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak
TMM
2002
133views more  TMM 2002»
14 years 9 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
IUI
2010
ACM
15 years 4 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
14 years 11 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
SEUS
2007
IEEE
15 years 4 months ago
Effective Appliance Selection by Complementary Context Feeding in Smart Home System
Smart Home System (SHS) is one of popular applications in ubiquitous computing, which provides convenient services for a user with userfriendly intelligent system interfaces. Among...
Taek Lee, Jiyong Park, Hoh Peter In