Sciweavers

2340 search results - page 23 / 468
» Data abstraction and information hiding
Sort
View
IV
2002
IEEE
126views Visualization» more  IV 2002»
14 years 14 days ago
The Empathic Visualisation Algorithm (EVA) - An Automatic Mapping from Abstract Data to Naturalistic Visual Structure
from Abstract Data to Naturalistic Visual Structure A. Loizides and M.Slater Department of Computer Science, University College London (UCL), London, UK This paper demonstrates a ...
Andreas Loizides, Mel Slater
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
FOSSACS
2010
Springer
14 years 2 months ago
A Semantic Foundation for Hidden State
Abstract. We present the first complete soundness proof of the antiframe rule, a recently proposed proof rule for capturing information hiding in the presence of higher-order stor...
Jan Schwinghammer, Hongseok Yang, Lars Birkedal, F...
LCN
2008
IEEE
14 years 1 months ago
Covert channels in multiplayer first person shooter online games
Abstract—Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing (overt) data transmissions to carry ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
LCPC
1994
Springer
13 years 11 months ago
Minimal Data Dependence Abstractions for Loop Transformations
Data Dependence Abstractions for Loop Transformations Yi-Qing Yang Corinne Ancourt Francois Irigoin Ecole des Mines de Paris/CRI 77305 Fontainebleau Cedex France tractions of prog...
Yi-Qing Yang, Corinne Ancourt, François Iri...