Sciweavers

3420 search results - page 553 / 684
» A Language-Based Approach to Security
Sort
View
CSMR
2006
IEEE
14 years 4 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
DSN
2006
IEEE
14 years 4 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
ICRA
2006
IEEE
61views Robotics» more  ICRA 2006»
14 years 4 months ago
Simulated Odor Tracking in a Plane Normal to the Wind Direction
— A new strategy is developed for tracking an odor plume in an environment where wind is present. The strategy is inspired by the mechanisms that animals use to orient to stimuli...
Adam J. Rutkowski, Mark A. Willis, Roger D. Quinn
ISM
2006
IEEE
104views Multimedia» more  ISM 2006»
14 years 4 months ago
A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction
In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our sche...
Saraju P. Mohanty, Parthasarathy Guturu, Elias Kou...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 4 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu