Sciweavers

14824 search results - page 2922 / 2965
» Security - Introduction
Sort
View
94
Voted
CORR
2010
Springer
206views Education» more  CORR 2010»
14 years 11 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
91
Voted
CORR
2010
Springer
119views Education» more  CORR 2010»
14 years 11 months ago
Report on the XBase Project
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce var...
Evangelos Zirintsis, Graham N. C. Kirby, Alan Dear...
CORR
2010
Springer
79views Education» more  CORR 2010»
14 years 11 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
CORR
2010
Springer
147views Education» more  CORR 2010»
14 years 11 months ago
Distributed Storage Codes Meet Multiple-Access Wiretap Channels
We consider i) the overhead minimization of maximum-distance seperable (MDS) storage codes for the repair of a single failed node and ii) the total secure degrees-of-freedom (S-DoF...
Dimitris S. Papailiopoulos, Alexandros G. Dimakis
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 11 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
« Prev « First page 2922 / 2965 Last » Next »