Sciweavers

879 search results - page 145 / 176
» Designing Closer to the Edge
Sort
View
JMM2
2008
103views more  JMM2 2008»
13 years 8 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
JSAC
2006
111views more  JSAC 2006»
13 years 8 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
ESE
2007
99views Database» more  ESE 2007»
13 years 8 months ago
An empirical study of cycles among classes in Java
Many authors have implied dependency cycles are widespread among the classes of object-oriented software systems. Proponents of the design principle Avoid cyclic dependencies amon...
Hayden Melton, Ewan D. Tempero
SIGCSE
2008
ACM
412views Education» more  SIGCSE 2008»
13 years 8 months ago
Undergraduate data communications and networking projects using opnet and wireshark software
The national importance of creating "content reflecting cutting edge developments in STEM fields" has been recognized the National Science Foundation. The National Resea...
Vasil Hnatyshin, Andrea F. Lobo
SIGIR
2008
ACM
13 years 8 months ago
To tag or not to tag -: harvesting adjacent metadata in large-scale tagging systems
We present HAMLET, a suite of principles, scoring models and algorithms to automatically propagate metadata along edges in a document neighborhood. As a showcase scenario we consi...
Adriana Budura, Sebastian Michel, Philippe Cudr&ea...