Sciweavers

224 search results - page 24 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
IH
2001
Springer
14 years 1 days ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld
ER
2007
Springer
87views Database» more  ER 2007»
14 years 1 months ago
Seed-Based Generation of Personalized Bio-ontologies for Information Extraction
Abstract. Biologists usually focus on only a small, individualized, subdomain of the huge domain of biology. With respect to their sub-domain, they often need data collected from v...
Cui Tao, David W. Embley
ECCV
2006
Springer
14 years 9 months ago
An Intensity Similarity Measure in Low-Light Conditions
In low-light conditions, it is known that Poisson noise and quantization noise become dominant sources of noise. While intensity difference is usually measured by Euclidean distanc...
François Alter, Yasuyuki Matsushita, Xiaoou...
DOLAP
2007
ACM
13 years 11 months ago
Optimal chunking of large multidimensional arrays for data warehousing
ss domain. Using this more abstract approach means that more data sources of varying types can be incorporated with less effort, and such heterogeneous data sources might be very r...
Ekow J. Otoo, Doron Rotem, Sridhar Seshadri
IWIA
2006
IEEE
14 years 1 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...