Sciweavers

18374 search results - page 57 / 3675
» Applications for data hiding
Sort
View
JSW
2008
97views more  JSW 2008»
13 years 9 months ago
Segmenting Histogram-based Robust Audio Watermarking Approach
Based on the invariant features and data distribution in time domain before and after attacking on the audio, it is clearly that the standard variance shows good invariant statisti...
Xiaoming Zhang
PODS
2011
ACM
163views Database» more  PODS 2011»
13 years 15 days ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
AWCC
2004
Springer
14 years 3 months ago
An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective
Abstract. This paper proposes an approach to dynamically reconfiguring service-oriented applications from a business perspective: CAFISEadapt, which defines both business-level and...
Jianwu Wang, Yanbo Han, Jing Wang 0002, Gang Li
KBSE
2009
IEEE
14 years 4 months ago
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
WETICE
2008
IEEE
14 years 4 months ago
On NAT Traversal in Peer-to-Peer Applications
A widely used technique to overcome the shortage of unique public IP addresses is Network Address Translation (NAT), which hides several hosts behind a single public address. This...
Konstantin Pussep, M. Weinert, Aleksandra Kovacevi...