Sciweavers

12264 search results - page 2210 / 2453
» Analysis of the rubberband algorithm
Sort
View
SSWMC
2004
15 years 5 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SSWMC
2004
15 years 5 months ago
The Watermark Evaluation Testbed (WET)
While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...
IM
2003
15 years 5 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed
WSC
2004
15 years 5 months ago
A Framework for Adaptive Synchronization of Distributed Simulations
Increased complexity of simulation models and the related modeling needs for global supply chains have necessitated the execution of simulations on multiple processors. While dist...
Bertan Altuntas, Richard A. Wysk
WSC
2004
15 years 5 months ago
A Data Warehouse Environment for Storing and Analyzing Simulation Output Data
Discrete event simulation modelling has been extensively used in modelling complex systems. Although it offers great conceptual-modelling flexibility, it is both computationally e...
Christos Vasilakis, Elia El-Darzi, Panagiotis Chou...
« Prev « First page 2210 / 2453 Last » Next »