Sciweavers

1191 search results - page 111 / 239
» Distributed Detection of Information Flows
Sort
View
IH
2004
Springer
14 years 2 months ago
Improved Detection of LSB Steganography in Grayscale Images
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
Andrew D. Ker
IJRR
2006
95views more  IJRR 2006»
13 years 9 months ago
Experiments with a Large Heterogeneous Mobile Robot Team: Exploration, Mapping, Deployment and Detection
We describe the design and experimental validation of a large heterogeneous mobile robot team built for the DARPA Software for Distributed Robotics (SDR) program. The core challen...
Andrew Howard, Lynne E. Parker, Gaurav S. Sukhatme
RAID
2010
Springer
13 years 7 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
AVI
2004
13 years 10 months ago
A visual tool for tracing users' behavior in Virtual Environments
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
Luca Chittaro, Lucio Ieronutti
WMRD
1990
14 years 1 months ago
Replication in Ficus Distributed File Systems
Ficus is a replicated general ling environment for Unix intended to scale to very large nationwide networks. The system employs an optimistic one copy availability" model in ...
Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr...