Sciweavers

234 search results - page 15 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
IH
1998
Springer
13 years 12 months ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
OOPSLA
2009
Springer
14 years 2 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
CORR
1998
Springer
125views Education» more  CORR 1998»
13 years 7 months ago
Automating Coreference: The Role of Annotated Training Data
Wereporthere ona studyof interannotatoragreementin the coreferencetask as defined by the MessageUnderstanding Conference(MUC-6and MUC-7).Basedon feedback from annotators, weclarif...
Lynette Hirschman, Patricia Robinson, John D. Burg...
AGENTS
2000
Springer
14 years 3 days ago
Exchanging tacit community knowledge by talking-virtualized-egos
This paper describes a method of exchanging tacit community knowledge using talking-virtualized-egos. We aim at sharing tacit knowledge in a community, for this purpose, we propos...
Hidekazu Kubota, Toyoaki Nishida, Tomoko Koda
PERCOM
2007
ACM
14 years 7 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins