Sciweavers

18374 search results - page 67 / 3675
» Applications for data hiding
Sort
View
IPPS
2003
IEEE
14 years 3 months ago
An Analysis of Performance Enhancement Techniques for Overset Grid Applications
The overset grid methodology has significantly reduced time-to-solution of high-fidelity computational fluid dynamics (CFD) simulations about complex aerospace configurations....
M. Jahed Djomehri, Rupak Biswas, Mark Potsdam, Rog...
IPPS
1999
IEEE
14 years 2 months ago
Optimizing Irregular HPF Applications using Halos
This paper presents language features for High Performance Fortran HPF to specify non-local access patterns of distributed arrays, called halos, and to control the communication as...
Siegfried Benkner
SOCIALCOM
2010
13 years 4 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
IMC
2009
ACM
14 years 4 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
CW
2008
IEEE
14 years 4 months ago
Construction of Autostereograms Taking into Account Object Colors and Its Applications for Steganography
Information on appearances of three-dimensional objects are transmitted via the Internet, and displaying objects plays an important role in a lot of areas such as movies and video...
Yusuke Tsuda, Yonghao Yue, Tomoyuki Nishita