In distributed computing systems, processes in different hosts take checkpoints to survive failures. For mobile computing systems, due to certain new characteristics conventional d...
In this paper, a robust and efficient digital image watermarking algorithm using the fast Hadamard transform (FHT) is proposed for the copyright protection of digital images. This...
Anthony Tung Shuen Ho, Jun Shen, A. K. K. Chow, J....
Web-based study resources can be viewed as a basic requirement in order to remain a competitive player on a more and more globalised educational market. For that reason it is gett...
Virtual private servers and application checkpoint and restart are two advanced operating system features which place different but related requirements on the way kernel-provided...
Sukadev Bhattiprolu, Eric W. Biederman, Serge E. H...
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...