Sciweavers

909 search results - page 99 / 182
» Reversible data hiding
Sort
View
ICSOFT
2007
14 years 11 months ago
Interoperating Context Discovery Mechanisms
Context-Aware applications adapt their behaviour to the current situation of the user. This information, for instance user location and user availability, is called context informa...
Tom Broens, Remco Poortinga, Jasper Aarts
VIIP
2001
14 years 11 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
CORR
2006
Springer
115views Education» more  CORR 2006»
14 years 10 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
SOSP
2007
ACM
15 years 6 months ago
Sinfonia: a new paradigm for building scalable distributed systems
We propose a new paradigm for building scalable distributed systems. Our approach does not require dealing with message-passing protocols—a major complication in existing distri...
Marcos Kawazoe Aguilera, Arif Merchant, Mehul A. S...
ICS
2007
Tsinghua U.
15 years 4 months ago
Automatic nonblocking communication for partitioned global address space programs
Overlapping communication with computation is an important optimization on current cluster architectures; its importance is likely to increase as the doubling of processing power ...
Wei-Yu Chen, Dan Bonachea, Costin Iancu, Katherine...