For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
With the advancement of micro-sensor and radio technology, wireless sensor networks are deployed in various applications. In a continuous monitoring application, sensors gather in...
Mobile advertising, which is an area of mobile commerce, is a form of advertising that targets users of handheld wireless devices such as mobile phones and personal digital assist...
— Recently, there has been renewed interest in structured logic arrays due to a number of inherent advantages. However, before they will be more widely adopted, structured logic ...