Sciweavers

18374 search results - page 47 / 3675
» Applications for data hiding
Sort
View

Publication
295views
13 years 5 months ago
 Self-Authentication Of Natural Color Images In Pascal Transform Domain
This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 10 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
ICS
2007
Tsinghua U.
14 years 3 months ago
Automatic nonblocking communication for partitioned global address space programs
Overlapping communication with computation is an important optimization on current cluster architectures; its importance is likely to increase as the doubling of processing power ...
Wei-Yu Chen, Dan Bonachea, Costin Iancu, Katherine...
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
14 years 1 months ago
Impact of Sharing-Based Thread Placement on Multithreaded Architectures
Multithreaded architectures context switch between instruction streams to hide memory access latency. Although this improves processor utilization, it can increase cache interfere...
Radhika Thekkath, Susan J. Eggers
NOSSDAV
2001
Springer
14 years 2 months ago
Network support for mobile multimedia using a self-adaptive distributed proxy
Recent advancements in video and audio codec technologies (e.g., RealVideo [18]) make multimedia streaming possible across a wide range of network conditions. With an increasing t...
Zhuoqing Morley Mao, Hoi-sheung Wilson So, Byungho...