Traffic signs are designed to be clearly seen by drivers. However a little is known about the visual influence of the traffic sign environment on how it will be perceived. Computer...
Ludovic Simon, Jean-Philippe Tarel, Roland Bremond
The goal of steganalysis is to search for the presence of hidden information in numerical contents. This paper is based on a previous LSB steganalysis scheme for digital images th...
Abstract. We address the problem of Quality of Service (QoS) requirements for multimedia applications (e.g., distance education, telemedicine, electronic commerce). These applicati...
Hanan Lutfiyya, Gary Molenkamp, Michael Katchabaw,...
Real-world electrical engineering problems can take advantage of the last Data Analysis methodologies. In this paper we will show that Genetic Fuzzy Rule-Based Systems and Genetic ...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...