Sciweavers

29 search results - page 2 / 6
» Beyond the Box
Sort
View
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
14 years 26 days ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
DRM
2003
Springer
14 years 18 days ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
DATE
2002
IEEE
136views Hardware» more  DATE 2002»
14 years 11 days ago
Beyond UML to an End-of-Line Functional Test Engine
In this paper, we analyze the use of UML as a starting point to go from design issues to end of production testing of complex embedded systems. The first point is the analysis of ...
Andrea Baldini, Alfredo Benso, Paolo Prinetto, Ser...
IAT
2009
IEEE
14 years 2 months ago
CubanSea: Cluster-Based Visualization of Search Results
—In recent years, there has been a move toward supporting the human element of Web search beyond a simple query box and a ranked list of search results. In this paper, we present...
Matthias Tilsner, Orland Hoeber, Adrian Fiech
ITPRO
2007
101views more  ITPRO 2007»
13 years 7 months ago
Beyond Search: Content Applications
Federation of Abstracting and Information Services presentation (“TheThomsonTransformation: Remaking a Global 500 Company,” http://www. nfais.org/TurnerNFAIS06.ppt). Now conten...
Stephen Buxton