Sciweavers

18374 search results - page 45 / 3675
» Applications for data hiding
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
SSWMC
2004
13 years 11 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 3 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
BMCBI
2004
102views more  BMCBI 2004»
13 years 9 months ago
FRAGS: estimation of coding sequence substitution rates from fragmentary data
Background: Rates of substitution in protein-coding sequences can provide important insights into evolutionary processes that are of biomedical and theoretical interest. Increased...
Estienne C. Swart, Winston A. Hide, Cathal Seoighe
CLUSTER
2001
IEEE
14 years 1 months ago
Clusterfile: A Flexible Physical Layout Parallel File System
This paper presents Clusterfile, a parallel file system that provides parallel file access on a cluster of computers. Existing parallel file systems offer little control over matc...
Florin Isaila, Walter F. Tichy