Sciweavers

18374 search results - page 40 / 3675
» Applications for data hiding
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
A Communication Latency Hiding Parallelization of a Traffic Flow Simulation
This work implements and analyses a highway traffic flow simulation based on continuum modeling of traffic dynamics. A traffic-flow simulation was developed and mapped onto a para...
Charles Michael Johnston, Anthony T. Chronopoulos
ICIP
2003
IEEE
14 years 2 months ago
Reversible watermark using difference expansion of triplets
A new reversible watermarking algorithm based on the difference expansion of colored images has been developed. Since the watermark is completely reversible, the original image ca...
Adnan M. Alattar
SSD
2007
Springer
155views Database» more  SSD 2007»
14 years 3 months ago
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries
Abstract. Modern mobile phones and PDAs are equipped with positioning capabilities (e.g., GPS). Users can access public location-based services (e.g., Google Maps) and ask spatial ...
Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue
VMCAI
2007
Springer
14 years 3 months ago
Better Under-Approximation of Programs by Hiding Variables
Abstraction frameworks use under-approximating transitions in order to prove existential properties of concrete systems. Under-approximating transifer to the concrete states that c...
Thomas Ball, Orna Kupferman