Sciweavers

112 search results - page 14 / 23
» An informed synchronization scheme for audio data hiding
Sort
View
IACR
2011
110views more  IACR 2011»
12 years 7 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 7 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
RTAS
2008
IEEE
14 years 1 months ago
Optimizing the Implementation of Communication in Synchronous Reactive Models
A fundamental asset of a model-based development process is the capability of providing an automatic implementation of the model that preserves its semantics and, at the same time...
Marco Di Natale, Guoqiang Wang, Alberto L. Sangiov...
LNCS
1993
13 years 11 months ago
Multimedia Database Systems
– In the past few years considerable demand for user oriented multimedia information systems has developed. These systems must provide a rich set of functionality so that new, co...
Arif Ghafoor, P. Bruce Berra
ICAD
2004
13 years 8 months ago
Data Set Selection for a Constrained Simple Sonification
Previous work on the production and test of various sonifications has shown that adding a sonification to an interface can assist the execution of a variety of operator tasks [1,2...
Shawn C. Garner